6.5
CVSSv2

CVE-2022-26110

Published: 06/04/2022 Updated: 03/09/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

An issue exists in HTCondor 8.8.x prior to 8.8.16, 9.0.x prior to 9.0.10, and 9.1.x prior to 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wisc htcondor

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1008634 condor: CVE-2022-26110 / HTCONDOR-2022-0003 Package: src:condor; Maintainer for src:condor is HTCondor Developers <condor-debian@cswiscedu>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 29 Mar 2022 20:09:04 UTC Severity: grave Tags: security, upstream Found in ...
Several flaws have been discovered in HTCondor, a distributed workload management system, which allow users with only READ access to any daemon to use a different authentication method than the administrator has specified If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another ...