First published: Tue Feb 27 2024(Updated: )
XML External Entity injection in Apache Ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue. More Details: Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation. This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.ambari.contrib.views:wfmanager | >=2.7.0<2.7.8 | 2.7.8 |
Apache Ambari | >=2.7.0<2.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50380 is categorized as a high-severity vulnerability due to its potential for XML External Entity injection leading to root-level file access.
To fix CVE-2023-50380, upgrade Apache Ambari to version 2.7.8 or later.
CVE-2023-50380 affects Apache Ambari versions 2.7.7 and earlier.
CVE-2023-50380 is an XML External Entity (XXE) injection vulnerability.
CVE-2023-50380 allows attackers to read arbitrary files and may lead to privilege escalation.