First published: Wed May 02 2018(Updated: )
Apache Ambari, versions 1.4.0 to 2.6.1, is susceptible to a directory traversal attack allowing an unauthenticated user to craft an HTTP request which provides read-only access to any file on the filesystem of the host the Ambari Server runs on that is accessible by the user the Ambari Server is running as. Direct network access to the Ambari Server is required to issue this request, and those Ambari Servers that are protected behind a firewall, or in a restricted network zone are at less risk of being affected by this issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ambari | >=1.4.0<=2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8003 is a vulnerability in Apache Ambari versions 1.4.0 to 2.6.1 that allows an unauthenticated user to perform a directory traversal attack and read any file on the host's filesystem accessible by the Ambari Server user.
CVE-2018-8003 has a severity rating of 5.3, which is considered medium.
Apache Ambari versions 1.4.0 to 2.6.1 are affected by CVE-2018-8003.
To fix CVE-2018-8003, it is recommended to update Apache Ambari to a version that is not vulnerable.
You can find more information about CVE-2018-8003 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/104161) and [Apache Ambari Vulnerabilities](https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities#AmbariVulnerabilities-CVE-2018-8003).