First published: Tue Jan 26 2021(Updated: )
A flaw was found in Apache hadoop. The WebHDFS client can send a SPNEGO authorization header to a remote URL without proper verification which could lead to an access restriction bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/hadoop | <3.2.2 | 3.2.2 |
redhat/hadoop | <3.1.4 | 3.1.4 |
redhat/hadoop | <2.10.1 | 2.10.1 |
Apache Hadoop | >=2.0.0<=2.10.0 | |
Apache Hadoop | >=3.0.0<=3.1.3 | |
Apache Hadoop | >=3.2.0<=3.2.1 | |
Apache Solr | =8.6.0 | |
Apache Solr | =8.6.2 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.2.0 | |
Oracle Financial Services Crime And Compliance Management Studio | =8.0.8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9492 is a vulnerability found in Apache Hadoop, which allows the WebHDFS client to send a SPNEGO authorization header to a remote URL without proper verification, leading to an access restriction bypass.
CVE-2020-9492 can compromise data confidentiality and integrity as well as system availability.
The affected software versions include Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0.
CVE-2020-9492 has a severity level of 8.8 (high).
To fix CVE-2020-9492, update your Apache Hadoop installation to version 3.2.2, 3.1.4, or 2.10.1.