Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cloudera_manager
(Cloudera)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 22 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-11-26 | CVE-2015-4457 | Multiple cross-site scripting (XSS) vulnerabilities in the Cloudera Manager UI before 5.4.3 allow remote authenticated users to inject arbitrary web script or HTML using unspecified vectors. | Cloudera_manager | N/A | ||
2019-07-11 | CVE-2018-11744 | Cloudera Manager through 5.15 has Incorrect Access Control. | Cloudera_manager | 8.1 | ||
2019-07-03 | CVE-2017-9327 | Secret data of processes managed by CM is not secured by file permissions. | Cloudera_manager | 6.5 | ||
2019-07-03 | CVE-2017-9326 | The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed. | Cloudera_manager | 7.5 | ||
2019-06-07 | CVE-2018-6185 | In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge... | Cloudera_manager, Navigator_key_trustee_kms | 4.9 | ||
2019-06-07 | CVE-2018-5798 | This CVE relates to an unspecified cross site scripting vulnerability in Cloudera Manager. | Cloudera_manager | 6.1 | ||
2019-05-24 | CVE-2018-10815 | An issue was discovered in Cloudera Manager before 5.13.4, 5.14.x before 5.14.4, and 5.15.x before 5.15.1. A read-only user can access sensitive cluster information. | Cloudera_manager | 6.5 | ||
2017-03-23 | CVE-2015-4078 | Cloudera Navigator 2.2.x before 2.2.4 and 2.3.x before 2.3.3 include support for SSLv3 when configured to use SSL/TLS, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). | Cloudera_manager, Navigator | 3.1 | ||
2017-03-23 | CVE-2015-2263 | Cloudera Manager 4.x, 5.0.x before 5.0.6, 5.1.x before 5.1.5, 5.2.x before 5.2.5, and 5.3.x before 5.3.3 uses global read permissions for files in its configuration directory when starting YARN NodeManager, which allows local users to obtain sensitive information by reading the files, as demonstrated by yarn.keytab or ssl-server.xml in /var/run/cloudera-scm-agent/process. | Cloudera_manager | 3.3 | ||
2015-02-10 | CVE-2014-8733 | Cloudera Manager 5.2.0, 5.2.1, and 5.3.0 stores the LDAP bind password in plaintext in unspecified world-readable files under /etc/hadoop, which allows local users to obtain this password. | Cloudera_manager | N/A |