CVE-2018-8003

CWE-22Path Traversal5 documents4 sources
Severity
5.3MEDIUM
EPSS
1.9%
top 16.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3
Latest updateMay 14

Description

Apache Ambari, versions 1.4.0 to 2.6.1, is susceptible to a directory traversal attack allowing an unauthenticated user to craft an HTTP request which provides read-only access to any file on the filesystem of the host the Ambari Server runs on that is accessible by the user the Ambari Server is running as. Direct network access to the Ambari Server is required to issue this request, and those Ambari Servers that are protected behind a firewall, or in a restricted network zone are at less risk o

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

NVDapache/ambari1.4.02.6.1
CVEListV5apache_software_foundation/apache_ambariApache Ambari 1.4.0 to 2.6.1

🔴Vulnerability Details

2
GHSA
GHSA-hpj4-w9fj-7vgh: Apache Ambari, versions 12022-05-14
CVEList
CVE-2018-8003: Apache Ambari, versions 12018-05-03

💬Community

2
Bugzilla
CVE-2018-8003 ambari: directory traversal provides read-only access to files [fedora-all]2018-05-04
Bugzilla
CVE-2018-8003 ambari: directory traversal provides read-only access to files2018-05-04