Access Restriction Bypass Affecting org.apache.ranger:ranger Open this link in a new tab package, versions [,0.7.1)
Attack Complexity
High
Integrity
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGAPACHERANGER-31475
-
published
31 Aug 2017
-
disclosed
6 Jun 2017
-
credit
Unknown
Introduced: 6 Jun 2017
CVE-2017-7677 Open this link in a new tabHow to fix?
Upgrade org.apache.ranger:ranger
to version 0.7.1 or higher.
Overview
org.apache.ranger:ranger
is a framework to enable, monitor and manage comprehensive data security across the Hadoop platform.
Affected versions of the package are vulnerable to Access Restriction Bypass. Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '*' wildcard character - like mytest, test.txt. This can result in unintended behavior.