apache/hbase: The latest CVE Vulnerabilities and Exploits for Penetration Test
apache/hbase Vulnerability Summary
- Vendor name: apache
- Product name: hbase
- Total vulnerabilities: 5 (as 2023-05-04)
apache/hbase Vulnerability List
CVE-2019-15544: An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all…
Published: 2019-08-26T18:15:00 Last Modified: 2021-09-14T12:25:00
Summary
An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve calls.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-15544 vulnerability.
References
- https://rustsec.org/advisories/RUSTSEC-2019-0003.html
- https://lists.apache.org/thread.html/r4ef574a5621b0e670a3ce641e9922543e34f22bf4c9ee9584aa67fcf@%3Cissues.hbase.apache.org%3E
- https://lists.apache.org/thread.html/rd64381fb8f92d640c1975dc50dcdf1b8512e02a2a7b20292d3565cae@%3Cissues.hbase.apache.org%3E
- https://lists.apache.org/thread.html/r00097d0b5b6164ea428554007121d5dc1f88ba2af7b9e977a10572cd@%3Cdev.hbase.apache.org%3E
- https://lists.apache.org/thread.html/r7fed8dd9bee494094e7011cf3c2ab75bd8754ea314c6734688c42932@%3Ccommon-issues.hadoop.apache.org%3E
See also: All popular products CVE Vulnerabilities of apache
CVE-2019-0212: In all previously released Apache HBase 2.x versions (2.0.0-2.0.4, 2.1.0-2.1.3), authorization…
Published: 2019-03-28T22:29:00 Last Modified: 2020-08-24T17:37:00
Summary
In all previously released Apache HBase 2.x versions (2.0.0-2.0.4, 2.1.0-2.1.3), authorization was incorrectly applied to users of the HBase REST server. Requests sent to the HBase REST server were executed with the permissions of the REST server itself, not with the permissions of the end-user. This issue is only relevant when HBase is configured with Kerberos authentication, HBase authorization is enabled, and the REST server is configured with SPNEGO authentication. This issue does not extend beyond the HBase REST server.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-0212 vulnerability.
References
- https://lists.apache.org/thread.html/66535e15007cda8f9308eec10e12ffe349e0b8b55e56ec6ee02b71d2@%3Cdev.hbase.apache.org%3E
- http://www.openwall.com/lists/oss-security/2019/03/27/3
- http://www.securityfocus.com/bid/107624
- https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
- https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
See also: All popular products CVE Vulnerabilities of apache
CVE-2018-8025: CVE-2018-8025 describes an issue in Apache HBase that affects the optional “Thrift 1” API server…
Published: 2018-06-27T15:29:00 Last Modified: 2018-09-04T16:27:00
Summary
CVE-2018-8025 describes an issue in Apache HBase that affects the optional “Thrift 1” API server when running over HTTP. There is a race-condition which could lead to authenticated sessions being incorrectly applied to users, e.g. one authenticated user would be considered a different user or an unauthenticated user would be treated as an authenticated user. https://issues.apache.org/jira/browse/HBASE-20664 implements a fix for this issue. It has been fixed in versions: 1.2.6.1, 1.3.2.1, 1.4.5, 2.0.1.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-8025 vulnerability.
References
- https://lists.apache.org/thread.html/a919e38f587c714c386a01d40fc8f45bd4219a65aaf2dc0bb4eccc96@%3Cdev.hbase.apache.org%3E
- http://www.securityfocus.com/bid/104554
See also: All popular products CVE Vulnerabilities of apache
CVE-2015-1836: Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM…
Published: 2015-12-21T11:59:00 Last Modified: 2017-03-24T01:59:00
Summary
Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1836 vulnerability.
References
- http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCA+RK=_CFiTfQ2d0V+kuJx_y5izmYccaKjXaJ3V72KK7tbOhbkg@mail.gmail.com%3E
- http://www-01.ibm.com/support/docview.wss?uid=swg21969546
- http://www.securitytracker.com/id/1034365
- https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
See also: All popular products CVE Vulnerabilities of apache
CVE-2013-2193: Apache HBase 0.92.x before 0.92.3 and 0.94.x before 0.94.9, when the Kerberos features are…
Published: 2014-05-29T14:19:00 Last Modified: 2017-03-24T01:59:00
Summary
Apache HBase 0.92.x before 0.92.3 and 0.94.x before 0.94.9, when the Kerberos features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.2
- CVSS: 4.3
- CVSS Vector: AV:A/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2013-2193 vulnerability.
References
- http://seclists.org/fulldisclosure/2013/Aug/250
- http://osvdb.org/96615
- https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
See also: All popular products CVE Vulnerabilities of apache