CVE-2023-50379

Malicious code injection in Apache Ambari in prior to 2.7.8. Users are recommended to upgrade to version 2.7.8, which fixes this issue. Impact: A Cluster Operator can manipulate the request by adding a malicious code injection and gain a root over the cluster main host.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*

History

05 May 2025, 21:01

Type Values Removed Values Added
First Time Apache
Apache ambari
CPE cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2024/02/27/1 - () http://www.openwall.com/lists/oss-security/2024/02/27/1 - Third Party Advisory, Mailing List
References () https://lists.apache.org/thread/jglww6h6ngxpo1r6r5fx7ff7z29lnvv8 - () https://lists.apache.org/thread/jglww6h6ngxpo1r6r5fx7ff7z29lnvv8 - Vendor Advisory, Mailing List

13 Feb 2025, 18:15

Type Values Removed Values Added
Summary (en) Malicious code injection in Apache Ambari in prior to 2.7.8. Users are recommended to upgrade to version 2.7.8, which fixes this issue. Impact: A Cluster Operator can manipulate the request by adding a malicious code injection and gain a root over the cluster main host. (en) Malicious code injection in Apache Ambari in prior to 2.7.8. Users are recommended to upgrade to version 2.7.8, which fixes this issue. Impact: A Cluster Operator can manipulate the request by adding a malicious code injection and gain a root over the cluster main host.

21 Nov 2024, 08:36

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/02/27/1 - () http://www.openwall.com/lists/oss-security/2024/02/27/1 -
References () https://lists.apache.org/thread/jglww6h6ngxpo1r6r5fx7ff7z29lnvv8 - () https://lists.apache.org/thread/jglww6h6ngxpo1r6r5fx7ff7z29lnvv8 -

13 Aug 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

27 Feb 2024, 14:20

Type Values Removed Values Added
Summary
  • (es) Inyección de código malicioso en Apache Ambari en versiones anteriores a 2.7.8. Se recomienda a los usuarios actualizar a la versión 2.7.8, que soluciona este problema. Impacto: un operador de clúster puede manipular la solicitud agregando una inyección de código malicioso y obteniendo una raíz sobre el host principal del clúster.

27 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 09:15

Updated : 2025-05-05 21:01


NVD link : CVE-2023-50379

Mitre link : CVE-2023-50379

CVE.ORG link : CVE-2023-50379


JSON object : View

Products Affected

apache

  • ambari
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')