First published: Mon Apr 27 2020(Updated: )
HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/condor | <=8.6.8~dfsg.1-2<=8.4.11~dfsg.1-1 | |
debian/condor | <=8.6.8~dfsg.1-2 | 8.6.8~dfsg.1-2+deb10u1 |
HTCondor | >=8.8.0<=8.8.6 | |
HTCondor | >=8.9.0<=8.9.4 | |
Red Hat Fedora | =30 | |
Red Hat Fedora | =31 | |
Red Hat Fedora | =32 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18823 has been identified as a high severity vulnerability due to its incorrect access control.
To fix CVE-2019-18823, upgrade HTCondor to version 8.6.8~dfsg.1-2+deb10u1 or later.
CVE-2019-18823 affects HTCondor versions up to and including 8.8.6 and development series up to 8.9.4.
The access control issue in CVE-2019-18823 allows jobs to be submitted using a different authentication method than the one specified by the administrator.
CVE-2019-18823 impacts multiple platforms including Debian and Fedora that utilize vulnerable versions of HTCondor.