CVE-2023-50380

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-50380
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50380.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-50380
Aliases
Published
2024-02-27T17:15:11Z
Modified
2025-03-27T20:55:45.134694Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue.

More Details:

Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation.

This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.

References

Affected packages

Git / github.com/apache/ambari

Affected ranges

Type
GIT
Repo
https://github.com/apache/ambari
Events

Affected versions

release-2.*

release-2.7.0
release-2.7.0-rc0
release-2.7.1
release-2.7.1-rc0
release-2.7.3
release-2.7.3-rc0
release-2.7.3-rc1
release-2.7.3-rc2
release-2.7.4
release-2.7.4-rc0
release-2.7.5
release-2.7.5-rc0
release-2.7.6
release-2.7.6-rc0
release-2.7.6-rc1