First published: Wed Jun 14 2017(Updated: )
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '*' wildcard character - like my*test, test*.txt. This can result in unintended behavior.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ranger | <=0.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7676 is classified as a medium severity vulnerability due to its potential to cause unintended behavior in resource matching.
To fix CVE-2017-7676, upgrade Apache Ranger to version 0.7.1 or later.
CVE-2017-7676 can lead to unintended access control behaviors by ignoring characters after the '*' wildcard in resource matching.
Apache Ranger versions prior to 0.7.1 are affected by CVE-2017-7676.
There are no known workarounds for CVE-2017-7676, and upgrading to a patched version is recommended.