org.apache.ranger:ranger@0.7.0 vulnerabilities

Security for Enforcing Enterprise Policies

Direct Vulnerabilities

Known vulnerabilities in the org.apache.ranger:ranger package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Cross-site Scripting (XSS)

org.apache.ranger:ranger is a framework to enable, monitor and manage comprehensive data security across the Hadoop platform.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the Policy import functionality.

How to fix Cross-site Scripting (XSS)?

Upgrade org.apache.ranger:ranger to version 2.0.0 or higher.

[0.7.0,2.0.0)
  • C
Improper Input Validation

org.apache.ranger:ranger is a framework to enable, monitor and manage comprehensive data security across the Hadoop platform.

Affected versions of this package are vulnerable to Improper Input Validation. Policy resource matcher effectively ignores characters after ‘*’ wildcard character. This can result in affected policies to apply to resources where they should not be applied.

How to fix Improper Input Validation?

Upgrade org.apache.ranger:ranger to version 0.7.1 or higher.

[0.6.0,0.7.1)
  • M
Stack-based Buffer Overflow

org.apache.ranger:ranger is a framework to enable, monitor and manage comprehensive data security across the Hadoop platform.

Affected versions of this package are vulnerable to Stack-based Buffer Overflow. Affected versions of this package are vulnerable to Stack-based Buffer Overflow. The UnixAuthenticationService class did not properly handling user input.

How to fix Stack-based Buffer Overflow?

Upgrade org.apache.ranger:ranger to version 1.2.0 or higher.

(,1.2.0)
  • M
Access Restriction Bypass

org.apache.ranger:ranger is a framework to enable, monitor and manage comprehensive data security across the Hadoop platform.

Affected versions of the package are vulnerable to Access Restriction Bypass. Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '*' wildcard character - like mytest, test.txt. This can result in unintended behavior.

How to fix Access Restriction Bypass?

Upgrade org.apache.ranger:ranger to version 0.7.1 or higher.

(,0.7.1)