Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0yMnY3LXc2YzUtdjRycs4AAdYW
Apache Ranger Access Restriction Bypass
Apache Ranger 0.5.x before 0.5.2 allows remote authenticated users to bypass intended parent resource-level access restrictions by leveraging mishandling of a resource-level exclude policy.
Permalink: https://github.com/advisories/GHSA-22v7-w6c5-v4rrJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yMnY3LXc2YzUtdjRycs4AAdYW
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: about 1 month ago
CVSS Score: 8.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-22v7-w6c5-v4rr, CVE-2016-0735
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-0735
- http://mail-archives.apache.org/mod_mbox/ranger-dev/201603.mbox/%3CD31EE434.14B879%25vel%40apache.org%3E
- https://github.com/apache/ranger/commit/18f216d0201eab93daea0b57035f7e6e3280bcfd
- https://github.com/advisories/GHSA-22v7-w6c5-v4rr
Blast Radius: 2.6
Affected Packages
maven:org.apache.ranger:ranger
Dependent packages: 0Dependent repositories: 2
Downloads:
Affected Version Ranges: >= 0.5.0, < 0.5.2
Fixed in: 0.5.2
All affected versions:
All unaffected versions: 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.7.0, 0.7.1, 1.0.0, 1.1.0, 1.2.0, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.4.0