-
CVSS Score
-The vulnerability stems from missing superuser privilege checks in NameNode RPC handlers. These administrative methods (rollEditLog, refreshNodes, setSafeMode) in NameNodeRpcServer were modified in patched versions to add security checks. In vulnerable versions, the absence of these checks allowed any authenticated user to execute privileged operations. Runtime profiling would show these RPC handler methods being invoked by non-privileged users during exploitation.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.hadoop:hadoop-common | maven | >= 2.6.0, <= 2.6.4 | 2.6.5 |
| org.apache.hadoop:hadoop-common | maven | >= 2.7.0, <= 2.7.2 | 2.7.3 |
A Semantic Attack on Google Gemini - Read the Latest Research