First published: Mon Nov 02 2015(Updated: )
Server-side request forgery (SSRF) vulnerability in the proxy endpoint (api/v1/proxy) in Apache Ambari before 2.1.0 allows remote authenticated users to conduct port scans and access unsecured services via a crafted REST call.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ambari | =1.5.0 | |
Apache Ambari | =1.5.1 | |
Apache Ambari | =1.6.0 | |
Apache Ambari | =1.6.1 | |
Apache Ambari | =1.7.0 | |
Apache Ambari | =2.0.0 | |
Apache Ambari | =2.0.1 | |
Apache Ambari | =2.0.2 | |
maven/org.apache.ambari:ambari | >=1.5.0<2.1.0 | 2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.