First published: Mon Nov 02 2015(Updated: )
Server-side request forgery (SSRF) vulnerability in the proxy endpoint (api/v1/proxy) in Apache Ambari before 2.1.0 allows remote authenticated users to conduct port scans and access unsecured services via a crafted REST call.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ambari | =1.5.0 | |
Apache Ambari | =1.5.1 | |
Apache Ambari | =1.6.0 | |
Apache Ambari | =1.6.1 | |
Apache Ambari | =1.7.0 | |
Apache Ambari | =2.0.0 | |
Apache Ambari | =2.0.1 | |
Apache Ambari | =2.0.2 | |
maven/org.apache.ambari:ambari | >=1.5.0<2.1.0 | 2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1775 is classified as a high severity vulnerability due to its potential to allow unauthorized access to sensitive services.
To fix CVE-2015-1775, upgrade Apache Ambari to version 2.1.0 or later.
CVE-2015-1775 is a server-side request forgery (SSRF) vulnerability.
Apache Ambari versions 1.5.0 through 2.0.2 are affected by CVE-2015-1775.
CVE-2015-1775 can be exploited by remote authenticated users through crafted REST calls.