First published: Tue Jan 21 2025(Updated: )
An XML External Entity (XXE) vulnerability exists in the Ambari/Oozie project, allowing an attacker to inject malicious XML entities. This vulnerability occurs due to insecure parsing of XML input using the `DocumentBuilderFactory` class without disabling external entity resolution. An attacker can exploit this vulnerability to read arbitrary files on the server or perform server-side request forgery (SSRF) attacks. The issue has been fixed in both Ambari 2.7.9 and the trunk branch.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ambari | <2.7.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23195 is classified as a critical vulnerability due to its potential for remote code execution through XML External Entity attacks.
To remediate CVE-2025-23195, you should upgrade Apache Ambari to version 2.7.9 or later and ensure that external entity resolution is disabled in XML parsers.
CVE-2025-23195 affects Apache Ambari versions earlier than 2.7.9.
CVE-2025-23195 can allow attackers to read sensitive files, perform internal port scanning, and execute denial-of-service attacks through malicious XML input.
Yes, CVE-2025-23195 is deemed relatively easy to exploit if the vulnerable software is accessible to an attacker.