GHSA-g3fc-8jv4-qmmv

Suggest an improvement
Source
https://github.com/advisories/GHSA-g3fc-8jv4-qmmv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g3fc-8jv4-qmmv/GHSA-g3fc-8jv4-qmmv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g3fc-8jv4-qmmv
Aliases
Published
2022-05-13T01:11:15Z
Modified
2025-04-22T20:27:08.885972Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Apache Knox allows impersonation of users
Details

For versions of Apache Knox from 0.2.0 to 0.11.0 - an authenticated user may use a specially crafted URL to impersonate another user while accessing WebHDFS through Apache Knox. This may result in escalated privileges and unauthorized data access. While this activity is audit logged and can be easily associated with the authenticated user, this is still a serious security issue. All users are recommended to upgrade to the Apache Knox 0.12.0 release.

Database specific
{
    "nvd_published_at": "2017-05-26T21:29:00Z",
    "github_reviewed_at": "2025-04-22T19:35:38Z",
    "github_reviewed": true,
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-346"
    ]
}
References

Affected packages

Maven / org.apache.knox:gateway-provider-identity-assertion-common

Package

Name
org.apache.knox:gateway-provider-identity-assertion-common
View open source insights on deps.dev
Purl
pkg:maven/org.apache.knox/gateway-provider-identity-assertion-common

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.2.0
Fixed
0.12.0

Affected versions

0.*

0.6.0
0.7.0
0.8.0
0.9.0
0.9.1
0.10.0
0.11.0