First published: Mon Feb 19 2018(Updated: )
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 4.3.0 and 5.0.0-beta1 to expose private files on the Oozie server process. The malicious user can construct a workflow XML file containing XML directives and configuration that reference sensitive files on the Oozie server host.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Oozie | =3.1.2 | |
Apache Oozie | =3.1.3 | |
Apache Oozie | =3.2 | |
Apache Oozie | =3.2.0 | |
Apache Oozie | =3.2.0-incubating | |
Apache Oozie | =3.3.0 | |
Apache Oozie | =3.3.0-rc0 | |
Apache Oozie | =3.3.0-rc1 | |
Apache Oozie | =3.3.1 | |
Apache Oozie | =3.3.1-rc0 | |
Apache Oozie | =3.3.1-rc1 | |
Apache Oozie | =3.3.2 | |
Apache Oozie | =3.3.2-rc0 | |
Apache Oozie | =4.0.0 | |
Apache Oozie | =4.0.0-rc0 | |
Apache Oozie | =4.0.0-rc1 | |
Apache Oozie | =4.0.0-rc3 | |
Apache Oozie | =4.0.1 | |
Apache Oozie | =4.0.1-rc0 | |
Apache Oozie | =4.0.1-rc1 | |
Apache Oozie | =4.1.0 | |
Apache Oozie | =4.1.0-rc0 | |
Apache Oozie | =4.1.0-rc1 | |
Apache Oozie | =4.2.0 | |
Apache Oozie | =4.2.0-rc0 | |
Apache Oozie | =4.3.0 | |
Apache Oozie | =4.3.0-rc0 | |
Apache Oozie | =4.3.0-rc1 | |
Apache Oozie | =5.0.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.