First published: Thu May 04 2023(Updated: )
Authenticated users with appropriate privileges can create policies having expressions that can exploit code execution vulnerability. This issue affects Apache Ranger: 2.3.0. Users are recommended to update to version 2.4.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ranger | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45048 is considered a critical vulnerability due to its potential for unauthorized code execution.
To mitigate CVE-2022-45048, users should upgrade Apache Ranger to version 2.4.0 or later.
CVE-2022-45048 affects users of Apache Ranger version 2.3.0 who have appropriate privileges to create policies.
CVE-2022-45048 is a code execution vulnerability that can be exploited through policy expressions.
There are no known workarounds for CVE-2022-45048; the only solution is to upgrade to an unaffected version.