{"api_version":"1","generated_at":"2026-04-22T22:50:53+00:00","cve":"CVE-2021-25642","urls":{"html":"https://cve.report/CVE-2021-25642","api":"https://cve.report/api/cve/CVE-2021-25642.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25642","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25642"},"summary":{"title":"CVE-2021-25642","description":"ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2022-08-25 14:15:00","updated_at":"2023-02-10 17:37:00"},"problem_types":["CWE-502"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20221201-0003/","name":"https://security.netapp.com/advisory/ntap-20221201-0003/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-25642 Apache Hadoop Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.apache.org/thread/g6vf2h4wdgzzdgk91mqozhs58wotq150","name":"https://lists.apache.org/thread/g6vf2h4wdgzzdgk91mqozhs58wotq150","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25642","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25642","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Apache Hadoop would like to thank Liu Ximing for reporting this issue.","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"25642","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"hadoop","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2021-25642","STATE":"PUBLIC","TITLE":"Apache Hadoop YARN remote code execution in ZKConfigurationStore of capacity scheduler"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Hadoop","version":{"version_data":[{"version_value":"2.9.0 to 2.10.1, 3.0.0-alpha1 to 3.1.4, 3.2.0 to 3.2.3, and 3.3.0 to 3.3.3"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"credit":[{"lang":"eng","value":"Apache Hadoop would like to thank Liu Ximing for reporting this issue."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":[[]],"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-502 Deserialization of Untrusted Data"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://lists.apache.org/thread/g6vf2h4wdgzzdgk91mqozhs58wotq150","name":"https://lists.apache.org/thread/g6vf2h4wdgzzdgk91mqozhs58wotq150"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20221201-0003/","url":"https://security.netapp.com/advisory/ntap-20221201-0003/"}]},"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-08-25 14:15:00","lastModifiedDate":"2023-02-10 17:37:00","problem_types":["CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*","versionStartIncluding":"2.9.0","versionEndExcluding":"2.10.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndExcluding":"3.3.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.2.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25642","Ordinal":"200449","Title":"CVE-2021-25642","CVE":"CVE-2021-25642","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25642","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}