Miggo Logo

CVE-2018-11765: Improper Authentication in Apache Hadoop

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.77534%
Published
4/30/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.hadoop:hadoop-mainmaven>= 3.0.0-alpha2, <= 3.0.03.0.1
org.apache.hadoop:hadoop-mainmaven>= 2.9.0, <= 2.9.22.9.3
org.apache.hadoop:hadoop-mainmaven>= 2.8.0, <= 2.8.52.8.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing authentication checks in Hadoop's web UI components when Kerberos is enabled without SPNEGO. The SecurityFilter class is central to authentication enforcement, and its doFilter() method would appear in stack traces when handling unauthenticated requests. NameNode and ResourceManager HTTP handlers are specifically called out in Hadoop security documentation as components requiring authentication. While exact patch details aren't available, the vulnerability pattern suggests these core authentication-related functions would be involved in processing unauthorized requests. Confidence levels reflect SecurityFilter's direct role in authentication versus component-specific handlers where exact vulnerable endpoints aren't specified in available documentation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *p**** ***oop v*rsions *.*.*-*lp*** to *.*.*, *.*.* to *.*.*, *.*.* to *.*.*, *ny us*rs **n ****ss som* s*rvl*ts wit*out *ut**nti**tion w**n K*r**ros *ut**nti**tion is *n**l** *n* SPN**O t*rou** *TTP is not *n**l**.

Reasoning

T** vuln*r**ility st*ms *rom missin* *ut**nti**tion ****ks in ***oop's w** UI *ompon*nts w**n K*r**ros is *n**l** wit*out SPN**O. T** `S**urity*ilt*r` *l*ss is **ntr*l to *ut**nti**tion *n*or**m*nt, *n* its `*o*ilt*r()` m*t*o* woul* *pp**r in st**k t