Vulnerabilities (CVE)

Filtered by vendor Cloudera Subscribe
Total 51 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-3192 1 Cloudera 1 Cloudera Manager 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Cloudera Manager 5.x before 5.7.1 places Sensitive Data in cleartext Readable Files.
CVE-2018-17860 1 Cloudera 1 Cdh 2024-02-04 6.5 MEDIUM 7.2 HIGH
Cloudera CDH has Insecure Permissions because ALL cannot be revoked.This affects 5.x through 5.15.1 and 6.x through 6.0.1.
CVE-2016-3131 1 Cloudera 1 Cdh 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Cloudera CDH before 5.6.1 allows authorization bypass via direct internal API calls.
CVE-2017-9326 1 Cloudera 1 Cloudera Manager 2024-02-04 3.5 LOW 7.5 HIGH
The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed.
CVE-2018-5798 1 Cloudera 1 Cloudera Manager 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
This CVE relates to an unspecified cross site scripting vulnerability in Cloudera Manager.
CVE-2017-9325 1 Cloudera 1 Cdh 2024-02-04 6.4 MEDIUM 7.5 HIGH
The provided secure solrconfig.xml sample configuration does not enforce Sentry authorization on /update/json/docs.
CVE-2018-6185 1 Cloudera 2 Cloudera Manager, Navigator Key Trustee Kms 2024-02-04 5.5 MEDIUM 4.9 MEDIUM
In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is "*" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data.
CVE-2017-9327 1 Cloudera 1 Cloudera Manager 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Secret data of processes managed by CM is not secured by file permissions.
CVE-2018-20091 1 Cloudera 1 Data Science Workbench 2024-02-04 6.5 MEDIUM 9.9 CRITICAL
An SQL injection vulnerability was found in Cloudera Data Science Workbench (CDSW) 1.4.0 through 1.4.2. This would allow any authenticated user to run arbitrary queries against CDSW's internal database. The database contains user contact information, encrypted CDSW passwords (in the case of local authentication), API keys, and stored Kerberos keytabs.
CVE-2018-15913 1 Cloudera 1 Cloudera Manager 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Cloudera Manager 5.x through 5.15.0. One type of page in Cloudera Manager uses a 'returnUrl' parameter to redirect the user to another page in Cloudera Manager once a wizard is completed. The validity of this parameter was not checked. As a result, the user could be automatically redirected to an attacker's external site or perform a malicious JavaScript function that results in cross-site scripting (XSS). This was fixed by not allowing any value in the returnUrl parameter with patterns such as http://, https://, //, or javascript. The only exceptions to this rule are the SAML Login/Logout URLs, which remain supported since they are explicitly configured and they are not passed via the returnUrl parameter.
CVE-2018-11215 1 Cloudera 1 Data Science Workbench 2024-02-04 7.5 HIGH 9.8 CRITICAL
Remote code execution is possible in Cloudera Data Science Workbench version 1.3.0 and prior releases via unspecified attack vectors.
CVE-2018-10815 1 Cloudera 1 Cloudera Manager 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in Cloudera Manager before 5.13.4, 5.14.x before 5.14.4, and 5.15.x before 5.15.1. A read-only user can access sensitive cluster information.
CVE-2018-15665 1 Cloudera 1 Data Science Workbench 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.2.x through 1.4.0. Unauthenticated users can get a list of user accounts.
CVE-2018-11744 1 Cloudera 1 Cloudera Manager 2024-02-04 6.8 MEDIUM 8.1 HIGH
Cloudera Manager through 5.15 has Incorrect Access Control.
CVE-2015-8094 1 Cloudera 1 Hue 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
Open redirect vulnerability in Cloudera HUE before 3.10.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the next parameter.
CVE-2017-15536 1 Cloudera 1 Data Science Workbench 2024-02-04 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Cloudera Data Science Workbench (CDSW) 1.x before 1.2.0. Several web application vulnerabilities allow malicious authenticated users of CDSW to escalate privileges in CDSW. CDSW users can exploit these vulnerabilities in combination to gain root access to CDSW nodes, gain access to the CDSW database which includes Kerberos keytabs of CDSW users and bcrypt hashed passwords, and gain access to other privileged information such as session tokens, invitation tokens, and environment variables.
CVE-2014-0229 2 Apache, Cloudera 2 Hadoop, Cdh 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Apache Hadoop 0.23.x before 0.23.11 and 2.x before 2.4.1, as used in Cloudera CDH 5.0.x before 5.0.2, do not check authorization for the (1) refreshNamenodes, (2) deleteBlockPool, and (3) shutdownDatanode HDFS admin commands, which allows remote authenticated users to cause a denial of service (DataNodes shutdown) or perform unnecessary operations by issuing a command.
CVE-2016-4947 1 Cloudera 1 Hue 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to desktop/api/users/autocomplete.
CVE-2015-2263 1 Cloudera 1 Cloudera Manager 2024-02-04 2.1 LOW 3.3 LOW
Cloudera Manager 4.x, 5.0.x before 5.0.6, 5.1.x before 5.1.5, 5.2.x before 5.2.5, and 5.3.x before 5.3.3 uses global read permissions for files in its configuration directory when starting YARN NodeManager, which allows local users to obtain sensitive information by reading the files, as demonstrated by yarn.keytab or ssl-server.xml in /var/run/cloudera-scm-agent/process.
CVE-2015-4078 1 Cloudera 2 Cloudera Manager, Navigator 2024-02-04 3.5 LOW 3.1 LOW
Cloudera Navigator 2.2.x before 2.2.4 and 2.3.x before 2.3.3 include support for SSLv3 when configured to use SSL/TLS, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).