CVE-2017-5646
Published on: 05/26/2017 12:00:00 AM UTC
Last Modified on: 04/06/2021 12:54:00 PM UTC
Certain versions of Knox from Apache contain the following vulnerability:
For versions of Apache Knox from 0.2.0 to 0.11.0 - an authenticated user may use a specially crafted URL to impersonate another user while accessing WebHDFS through Apache Knox. This may result in escalated privileges and unauthorized data access. While this activity is audit logged and can be easily associated with the authenticated user, this is still a serious security issue. All users are recommended to upgrade to the Apache Knox 0.12.0 release.
- CVE-2017-5646 has been assigned by
secu[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Apache Software Foundation - Apache Knox version 0.2.0 to 0.11.0
CVSS3 Score: 6.8 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | HIGH | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | NONE |
CVSS2 Score: 4.9 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Pony Mail! | lists.apache.org text/html |
![]() |
[ANNOUNCE] CVE-2017-5646: Apache Knox Impersonation Issue for WebHDFS | Mailing List Vendor Advisory mail-archives.apache.org text/xml |
![]() |
Apache Knox CVE-2017-5646 User Impersonation Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Apache | Knox | 0.10.0 | All | All | All |
Application | Apache | Knox | 0.11.0 | All | All | All |
Application | Apache | Knox | 0.2.0 | All | All | All |
Application | Apache | Knox | 0.3.0 | All | All | All |
Application | Apache | Knox | 0.4.0 | All | All | All |
Application | Apache | Knox | 0.5.0 | All | All | All |
Application | Apache | Knox | 0.6.0 | All | All | All |
Application | Apache | Knox | 0.7.0 | All | All | All |
Application | Apache | Knox | 0.8.0 | All | All | All |
Application | Apache | Knox | 0.9.0 | All | All | All |
Application | Apache | Knox | 0.10.0 | All | All | All |
Application | Apache | Knox | 0.11.0 | All | All | All |
Application | Apache | Knox | 0.2.0 | All | All | All |
Application | Apache | Knox | 0.3.0 | All | All | All |
Application | Apache | Knox | 0.4.0 | All | All | All |
Application | Apache | Knox | 0.5.0 | All | All | All |
Application | Apache | Knox | 0.6.0 | All | All | All |
Application | Apache | Knox | 0.7.0 | All | All | All |
Application | Apache | Knox | 0.8.0 | All | All | All |
Application | Apache | Knox | 0.9.0 | All | All | All |
- cpe:2.3:a:apache:knox:0.10.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.11.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.8.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.9.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.10.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.11.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.5.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.8.0:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:knox:0.9.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE