First published: Tue Mar 07 2017(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Cloudera Manager 5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) Template Name field when renaming a template; (2) KDC Server host, (3) Kerberos Security Realm, (4) Kerberos Encryption Types, (5) Advanced Configuration Snippet (Safety Valve) for [libdefaults] section of krb5.conf, (6) Advanced Configuration Snippet (Safety Valve) for the Default Realm in krb5.conf, (7) Advanced Configuration Snippet (Safety Valve) for remaining krb5.conf, or (8) Active Directory Account Prefix fields in the Kerberos wizard; or (9) classicWizard parameter to cmf/cloudera-director/redirect.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudera Manager | <=5.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4948 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2016-4948, upgrade Cloudera Manager to version 5.5.1 or later to mitigate the XSS vulnerabilities.
CVE-2016-4948 affects Cloudera Manager versions 5.5.0 and earlier.
The impact of CVE-2016-4948 includes the ability for remote attackers to inject arbitrary web scripts or HTML, leading to information disclosure or session hijacking.
There are no specific workarounds for CVE-2016-4948; the recommended approach is to upgrade to a patched version.