Vulnerabilities (CVE)

Filtered by vendor Wisc Subscribe
Total 11 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-26110 2 Debian, Wisc 2 Debian Linux, Htcondor 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon.
CVE-2021-45104 1 Wisc 1 Htcondor 2024-11-21 5.8 MEDIUM 7.4 HIGH
An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.
CVE-2021-45103 1 Wisc 1 Htcondor 2024-11-21 5.5 MEDIUM 8.1 HIGH
An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.
CVE-2021-45102 1 Wisc 1 Htcondor 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.
CVE-2021-45101 1 Wisc 1 Htcondor 2024-11-21 5.5 MEDIUM 8.1 HIGH
An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.
CVE-2021-25312 1 Wisc 1 Htcondor 2024-11-21 6.5 MEDIUM 8.8 HIGH
HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.
CVE-2021-25311 1 Wisc 1 Htcondor 2024-11-21 9.0 HIGH 9.9 CRITICAL
condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.
CVE-2019-18823 2 Fedoraproject, Wisc 2 Fedora, Htcondor 2024-11-21 7.5 HIGH 9.8 CRITICAL
HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)
CVE-2017-16816 1 Wisc 1 Htcondor 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions.
CVE-2014-8126 1 Wisc 1 Htcondor 2024-11-21 6.5 MEDIUM 8.8 HIGH
The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code.
CVE-2012-3490 1 Wisc 1 Htcondor 2024-11-21 9.0 HIGH 8.8 HIGH
The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.