<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
[CVE-2020-1963] Apache Ignite access to file system disclosure vulnerability
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Юрий <jury.gerzhedowich () gmail com>
Date: Wed, 3 Jun 2020 13:31:52 +0300
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
CVE-2020-1963: Apache Ignite access to file system through predefined H2
SQL functions
Severity: Critical
Vendor:
The Apache Software Foundation
Versions Affected:
All versions of Apache Ignite up to 2.8
Impact
An attacker can use embedded H2 SQL functions to access a filesystem for
write and read.
Description:
Apache Ignite uses H2 database to build SQL distributed execution engine.
H2 provides SQL functions which could be used by attacker to access to a
filesystem.
Mitigation:
Ignite 2.8 or earlier users should upgrade to 2.8.1
In case SQL is not used at all the issue could be mitigated by removing
ignite-indexing.jar from Ignite classpath
Risk could be partially mitigated by using non privileged user to start
Apache Ignite.
Credit:
This issue was discovered by Sriveena Mattaparthi of ekaplus.com
--
Живи с улыбкой! :D
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
[CVE-2020-1963] Apache Ignite access to file system disclosure vulnerability Юрий (Jun 03)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->