Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8547-8823-m279

Опубликовано: 29 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

In HDP Server versions below 4.6.2.2978 on Linux, unauthorized access could occur via IP spoofing using the X-Forwarded-For header. 

Since XFF is a client-controlled header, it could be spoofed, allowing unauthorized access if the spoofed IP matched a whitelisted range.

This vulnerability could be exploited to bypass IP restrictions, though valid user credentials would still be required for resource access.

In HDP Server versions below 4.6.2.2978 on Linux, unauthorized access could occur via IP spoofing using the X-Forwarded-For header. 

Since XFF is a client-controlled header, it could be spoofed, allowing unauthorized access if the spoofed IP matched a whitelisted range.

This vulnerability could be exploited to bypass IP restrictions, though valid user credentials would still be required for resource access.

EPSS

Процентиль: 1%
0.00011
Низкий

8.4 High

CVSS3

Дефекты

CWE-345

Связанные уязвимости

CVSS3: 8.4
nvd
6 месяцев назад

In HDP Server versions below 4.6.2.2978 on Linux, unauthorized access could occur via IP spoofing using the X-Forwarded-For header.  Since XFF is a client-controlled header, it could be spoofed, allowing unauthorized access if the spoofed IP matched a whitelisted range. This vulnerability could be exploited to bypass IP restrictions, though valid user credentials would still be required for resource access.

EPSS

Процентиль: 1%
0.00011
Низкий

8.4 High

CVSS3

Дефекты

CWE-345