CVE-2020-9492

CVSS V2 Medium 6.5 CVSS V3 High 8.8
Description
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification.
Overview
  • CVE ID
  • CVE-2020-9492
  • Assigner
  • security@apache.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-01-26T18:16:10
  • Last Modified Date
  • 2022-12-06T21:52:42
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:* 1 OR 2.0.0 2.10.0
cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:* 1 OR 3.0.0 3.1.3
cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:* 1 OR 3.2.0 3.2.1
cpe:2.3:a:apache:solr:8.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:solr:8.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://lists.apache.org/thread.html/r0a534f1cde7555f7208e9f9b791c1ab396d215eaaef283b3a9153429@%3Ccommits.druid.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r49c9ab444ab1107c6a8be8a0d66602dec32a16d96c2631fec8d309fb@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r4a57de5215494c35c8304cf114be75d42df7abc6c0c54bf163c3e370@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r513758942356ccd0d14538ba18a09903fc72716d74be1cb727ea91ff%40%3Cgeneral.hadoop.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r6341f2a468ced8872a71997aa1786ce036242413484f0fa68dc9ca02@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r6c2fa7949738e9d39606f1d7cd890c93a2633e3357c9aeaf886ea9a6@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r79201a209df9a4e7f761e537434131b4e39eabec4369a7d668904df4@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r79323adac584edab99fd5e4b52a013844b784a5d4b600da0662b33d6@%3Ccommits.druid.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r9328eb49305e4cacc80e182bfd8a2efd8e640d940e24f5bfd7d5cb26@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/r941e9be04efe0f455d20aeac88516c0848decd7e7b1d93d5687060f4@%3Ccommits.druid.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/rb12afaa421d483863c4175e42e5dbd0673917a3cff73f3fca4f8275f@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/rc0057ebf32b646ab47f7f5744a8948332e015c39044cbb9d87ea76cd@%3Ccommits.druid.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/rca4516b00b55b347905df45e5d0432186248223f30497db87aba8710@%3Cannounce.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/re4129c6b9e0410848bbd3761187ce9c19bc1cd491037b253007df99e@%3Cissues.solr.apache.org%3E Mailing List Vendor Advisory
https://security.netapp.com/advisory/ntap-20210304-0001/ Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html
History
Created Old Value New Value Data Type Notes
2022-05-10 06:43:58 Added to TrackCVE
2022-12-05 20:53:57 2021-01-26T18:16Z 2021-01-26T18:16:10 CVE Published Date updated
2022-12-05 20:53:57 2022-07-25T18:15:33 CVE Modified Date updated
2022-12-05 20:53:57 Undergoing Analysis Vulnerability Status updated
2022-12-05 20:54:02 References updated
2022-12-06 22:12:07 2022-12-06T21:52:42 CVE Modified Date updated
2022-12-06 22:12:07 Undergoing Analysis Analyzed Vulnerability Status updated