Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-26612

Опубликовано: 07 апр. 2022
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3

A flaw was found in Apache Hadoop, where an unTar function bypasses a check. This flaw allows an attacker to write outside of the expected base directory on Windows.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2hadoopNot affected
Logging Subsystem for Red Hat OpenShifthadoopAffected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/volsync-mover-rclone-rhel8Not affected
Red Hat AMQ Broker 7hadoopNot affected
Red Hat Data Grid 8hadoopNot affected
Red Hat Fuse 7hadoopNot affected
Red Hat Integration Camel K 1hadoopWill not fix
Red Hat Integration Camel Quarkus 1hadoopWill not fix
Red Hat Integration Data Virtualisation OperatorhadoopOut of support scope
Red Hat JBoss Data Grid 7hadoopOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-281
https://bugzilla.redhat.com/show_bug.cgi?id=2073923hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows

EPSS

Процентиль: 37%
0.00162
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3

CVSS3: 9.8
debian
почти 4 года назад

In Apache Hadoop, The unTar function uses unTarUsingJava function on W ...

CVSS3: 9.8
github
почти 4 года назад

Path traversal in Hadoop

CVSS3: 9.8
fstec
почти 4 года назад

Уязвимость реализации функции unTar() платформы для распределенной разработки и выполнения программ Apache Hadoop, позволяющая нарушителю записывать произвольные файлы

EPSS

Процентиль: 37%
0.00162
Низкий

9.8 Critical

CVSS3