CWE
310
Advisory Published
Updated

CVE-2018-6185

First published: Fri Jun 07 2019(Updated: )

In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Cloudera Cloudera Manager=5.12.0
Cloudera Cloudera Manager=5.12.1
Cloudera Cloudera Manager=5.12.2
Cloudera Cloudera Manager=5.13.0
Cloudera Cloudera Manager=5.13.1
Cloudera Navigator Key Trustee KMS=5.12.0
Cloudera Navigator Key Trustee KMS=5.13.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID of this issue?

    The vulnerability ID of this issue is CVE-2018-6185.

  • What is the severity level of CVE-2018-6185?

    The severity level of CVE-2018-6185 is medium.

  • What is the affected software for CVE-2018-6185?

    The affected software for CVE-2018-6185 is Cloudera Navigator Key Trustee KMS version 5.12.0, 5.12.1, 5.12.2, 5.13.0, and 5.13.1.

  • How does CVE-2018-6185 allow remote access to purge and undelete API calls?

    CVE-2018-6185 allows remote access to purge and undelete API calls by having incorrect default ACL values in Cloudera Navigator Key Trustee KMS versions 5.12.0, 5.12.1, 5.12.2, 5.13.0, and 5.13.1.

  • Where can I find more information about CVE-2018-6185?

    More information about CVE-2018-6185 can be found on the Cloudera website and in their documentation on security bulletins.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203