CVE-2016-0733

Published on: 04/12/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:14 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Ranger from Apache contain the following vulnerability:

The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username.

  • CVE-2016-0733 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
CVE update (CVE-2015-5167 & CVE-2016-0733) - Fixed in Ranger 0.5.1 mail-archives.apache.org
text/xml
URL Logo MLIST [ranger-dev] 20160205 CVE update (CVE-2015-5167 & CVE-2016-0733) - Fixed in Ranger 0.5.1
Apache Ranger Authentication Bypass and Security Bypass Vulnerabilities cve.report (archive)
text/html
URL Logo BID 82871
[RANGER-835] Authentication bypass in Ranger API - ASF JIRA Vendor Advisory
issues.apache.org
text/html
URL Logo CONFIRM issues.apache.org/jira/browse/RANGER-835
Vulnerabilities found in Ranger - Ranger - Apache Software Foundation Vendor Advisory
cwiki.apache.org
text/html
URL Logo CONFIRM cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheRangerAllAllAllAll
  • cpe:2.3:a:apache:ranger:*:*:*:*:*:*:*:*: