Apache Impala vulnerabilities

7 known vulnerabilities affecting apache/impala.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH3MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2021-28131HIGHCVSS 7.5fixed in 4.0.02021-07-22
CVE-2021-28131 [HIGH] CWE-288 CVE-2021-28131: Impala sessions use a 16 byte secret to verify that the session is not being hijacked by another use Impala sessions use a 16 byte secret to verify that the session is not being hijacked by another user. However, these secrets appear in the Impala logs, therefore Impala users with access to the logs can use another authenticated user's sessions with specially constructed requests. This means the attacker is able to execute statements for which they d
nvd
CVE-2019-10084HIGHCVSS 7.5≥ 2.7.0, ≤ 3.2.02019-11-05
CVE-2019-10084 [HIGH] CWE-311 CVE-2019-10084: In Apache Impala 2.7.0 to 3.2.0, an authenticated user with access to the IDs of active Impala queri In Apache Impala 2.7.0 to 3.2.0, an authenticated user with access to the IDs of active Impala queries or sessions can interact with those sessions or queries via a specially-constructed request and thereby potentially bypass authorization and audit mechanisms. Session and query IDs are unique and random, but have not been documented or consistently t
nvd
CVE-2018-11792CRITICALCVSS 9.8fixed in 3.0.12018-10-24
CVE-2018-11792 [CRITICAL] CWE-732 CVE-2018-11792: In Apache Impala before 3.0.1, ALTER TABLE/VIEW RENAME required ALTER on the old table. This may pos In Apache Impala before 3.0.1, ALTER TABLE/VIEW RENAME required ALTER on the old table. This may pose a potential security risk, such as having ALTER on a table and ALL on a particular database allows a user to move the table to a database with ALL, which will automatically grant that user with ALL privilege on that table due to the privilege inhe
nvd
CVE-2018-11785MEDIUMCVSS 6.5fixed in 3.0.12018-10-24
CVE-2018-11785 [MEDIUM] CWE-862 CVE-2018-11785: Missing authorization check in Apache Impala before 3.0.1 allows a Kerberos-authenticated but unauth Missing authorization check in Apache Impala before 3.0.1 allows a Kerberos-authenticated but unauthorized user to inject random data into a running query, leading to wrong results for a query.
nvd
CVE-2017-9792MEDIUMCVSS 6.5v2.8.0v2.9.02017-10-04
CVE-2017-9792 [MEDIUM] CWE-732 CVE-2017-9792: In Apache Impala (incubating) before 2.10.0, a malicious user with "ALTER" permissions on an Impala In Apache Impala (incubating) before 2.10.0, a malicious user with "ALTER" permissions on an Impala table can access any other Kudu table data by altering the table properties to make it "external" and then changing the underlying table mapping to point to other Kudu tables. This violates and works around the authorization requirement that creating a K
nvd
CVE-2017-5640CRITICALCVSS 9.8v2.7.0v2.8.02017-07-10
CVE-2017-5640 [CRITICAL] CWE-287 CVE-2017-5640: It was noticed that a malicious process impersonating an Impala daemon in Apache Impala (incubating) It was noticed that a malicious process impersonating an Impala daemon in Apache Impala (incubating) 2.7.0 to 2.8.0 could cause Impala daemons to skip authentication checks when Kerberos is enabled (but TLS is not). If the malicious server responds with 'COMPLETE' before the SASL handshake has completed, the client will consider the handshake as com
nvd
CVE-2017-5652HIGHCVSS 7.5v2.7.0v2.8.02017-07-10
CVE-2017-5652 [HIGH] CWE-319 CVE-2017-5652: During a routine security analysis, it was found that one of the ports in Apache Impala (incubating) During a routine security analysis, it was found that one of the ports in Apache Impala (incubating) 2.7.0 to 2.8.0 sent data in plaintext even when the cluster was configured to use TLS. The port in question was used by the StatestoreSubscriber class which did not use the appropriate secure Thrift transport when TLS was turned on. It was therefore poss
nvd