CVE-2016-2174:
SQL injection vulnerability in the policy admin tool in Apache Ranger
7.2
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
10/17/2018
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.ranger:ranger | maven | < 0.5.3 | 0.5.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unparameterized SQL queries using the eventTime parameter. The primary vulnerable function would be the Data Access Object (DAO) method that handled policy queries with eventTime parameters using string concatenation, as indicated by the patch note about replacing native queries with JPA named queries. The REST controller endpoint that accepts the eventTime parameter and passes it to the DAO would appear in call stacks during exploitation. While we don't have exact patch diffs, the CVE description explicitly identifies both the vulnerable parameter (eventTime) and the mitigation strategy (JPA named queries), strongly indicating database access functions handling this parameter were vulnerable.