Access Restriction Bypass Affecting org.apache.ranger:ranger package, versions [,0.7.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHERANGER-31475
  • published31 Aug 2017
  • disclosed6 Jun 2017
  • creditUnknown

Introduced: 6 Jun 2017

CVE-2017-7677  (opens in a new tab)
CWE-275  (opens in a new tab)

How to fix?

Upgrade org.apache.ranger:ranger to version 0.7.1 or higher.

Overview

org.apache.ranger:ranger is a framework to enable, monitor and manage comprehensive data security across the Hadoop platform.

Affected versions of the package are vulnerable to Access Restriction Bypass. Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '*' wildcard character - like mytest, test.txt. This can result in unintended behavior.

CVSS Scores

version 3.1