First published: Fri Jun 07 2019(Updated: )
In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudera Cloudera Manager | =5.12.0 | |
Cloudera Cloudera Manager | =5.12.1 | |
Cloudera Cloudera Manager | =5.12.2 | |
Cloudera Cloudera Manager | =5.13.0 | |
Cloudera Cloudera Manager | =5.13.1 | |
Cloudera Navigator Key Trustee KMS | =5.12.0 | |
Cloudera Navigator Key Trustee KMS | =5.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2018-6185.
The severity level of CVE-2018-6185 is medium.
The affected software for CVE-2018-6185 is Cloudera Navigator Key Trustee KMS version 5.12.0, 5.12.1, 5.12.2, 5.13.0, and 5.13.1.
CVE-2018-6185 allows remote access to purge and undelete API calls by having incorrect default ACL values in Cloudera Navigator Key Trustee KMS versions 5.12.0, 5.12.1, 5.12.2, 5.13.0, and 5.13.1.
More information about CVE-2018-6185 can be found on the Cloudera website and in their documentation on security bulletins.