9.8
CVSSv3

CVE-2019-18823

Published: 27/04/2020 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wisc htcondor

fedoraproject fedora 30

fedoraproject fedora 31

fedoraproject fedora 32

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #963777 condor: CVE-2019-18823 Package: src:condor; Maintainer for src:condor is HTCondor Developers <condor-debian@cswiscedu>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 26 Jun 2020 19:33:01 UTC Severity: grave Tags: security, upstream Found in versions condor/868~ ...
Several flaws have been discovered in HTCondor, a distributed workload management system, which allow users with only READ access to any daemon to use a different authentication method than the administrator has specified If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another ...