| --- |
| title: "Vulnerabilities Found in Apache Ranger" |
| --- |
| <!-- |
| - Licensed to the Apache Software Foundation (ASF) under one or more |
| - contributor license agreements. See the NOTICE file distributed with |
| - this work for additional information regarding copyright ownership. |
| - The ASF licenses this file to You under the Apache License, Version 2.0 |
| - (the "License"); you may not use this file except in compliance with |
| - the License. You may obtain a copy of the License at |
| - |
| - http://www.apache.org/licenses/LICENSE-2.0 |
| - |
| - Unless required by applicable law or agreed to in writing, software |
| - distributed under the License is distributed on an "AS IS" BASIS, |
| - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| - See the License for the specific language governing permissions and |
| - limitations under the License. |
| --> |
| |
| ## Introduction |
| This page contains a list of security vulnerabilities that have been found in Apache Ranger. For each vulnerability, the following information is provided: |
| |
| ### Fixed in Ranger [2.6.0](../release-notes/2.6.0.md) |
| |
| | CVE-2024-55532 | Improper Neutralization of Formula Elements in a CSV File in Export to CSV feature of Apache Ranger | |
| |-------------------|----------------------------------------------------------------------------------------------------| |
| | Severity | Low | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | Apache Ranger versions prior to `2.6.0` | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Improper Neutralization issue in Export to CSV functionality | |
| | Fix detail | Added logic to properly sanitize the exported content | |
| | Mitigation | Users should upgrade to `2.6.0` or later version of Apache Ranger with the fix | |
| | Credit | 김도균 (a2256014@naver.com) | |
| |
| ### Fixed in Ranger [2.5.0](../release-notes/2.5.0.md) |
| | CVE-2024-45478 | Stored XSS vulnerability in Edit Service Page of Apache Ranger UI | |
| |-------------------|----------------------------------------------------------------------------------------------| |
| | Severity | Moderate | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | Apache Ranger versions prior to `2.5.0` | |
| | Users affected | All users of ranger policy admin tool UI | |
| | Description | Apache Ranger was found to be vulnerable to a Stored XSS issue in Edit Service functionality | |
| | Fix detail | Added logic to validate the user input | |
| | Mitigation | Users should upgrade to `2.5.0` or later version of Apache Ranger with the fix | |
| | Credit | Gyujin | |
| |
| | CVE-2024-45479 | SSRF vulnerability in Edit Service Page of Apache Ranger UI | |
| |-------------------|----------------------------------------------------------------------------------------------| |
| | Severity | Moderate | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | Apache Ranger versions prior to `2.5.0` | |
| | Users affected | All users of ranger policy admin tool UI | |
| | Description | Apache Ranger was found to be vulnerable to a SSRF issue in Edit Service functionality | |
| | Fix detail | Added logic to validate the user input | |
| | Mitigation | Users should upgrade to `2.5.0` or later version of Apache Ranger with the fix | |
| | Credit | Gyujin | |
| |
| ### Fixed in Ranger 2.0.0 |
| | CVE-2019-12397 | Apache Ranger cross site scripting issue | |
| |-------------------|---------------------------------------------------------------------------------------------------| |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.7.0` to `1.2.0` versions of Apache Ranger, prior to `2.0.0` | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Apache Ranger was found to be vulnerable to a Cross-Site Scripting in policy import functionality | |
| | Fix detail | Added logic to sanitize the user input | |
| | Mitigation | Users should upgrade to `2.0.0` or later version of Apache Ranger with the fix | |
| | Credit | Jan Kaszycki from STM Solutions | |
| |
| ### Fixed in Ranger 1.2.0 |
| | CVE-2018-11778 | Apache Ranger Stack based buffer overflow | |
| |-------------------|----------------------------------------------------------------------------------------------------------------| |
| | Severity | Critical | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | Apache Ranger versions prior to `1.2.0` | |
| | Users affected | Unix Authentication Service users | |
| | Description | Apache Ranger UnixAuthenticationService should properly handle user input to avoid Stack-based buffer overflow | |
| | Fix detail | UnixAuthenticationService was updated to correctly handle user input | |
| | Mitigation | Users should upgrade to `1.2.0` or later version of Apache Ranger with the fix | |
| | Credit | Alexander Klink | |
| |
| ### Fixed in Ranger 0.7.1 |
| | CVE-2017-7676 | Apache Ranger policy evaluation ignores characters after ‘*’ wildcard character | |
| |-------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |
| | Severity | Critical | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.6.x`/`0.7.0` versions of Apache Ranger | |
| | Users affected | Environments that use Ranger policies with characters after \‘\*\’ wildcard character – like my\*test, test\*.txt | |
| | Description | Policy resource matcher effectively ignores characters after \‘\*\’ wildcard character. This can result in affected policies to apply to resources where they should not be applied | |
| | Fix detail | Ranger policy resource matcher was updated to correctly handle wildcard matches. | |
| | Mitigation | Users should upgrade to `0.7.1` or later version of Apache Ranger with the fix | |
| |
| | CVE-2017-7677 | Apache Ranger Hive Authorizer should check for RWX permission when external location is specified | |
| |-------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |
| | Severity | Critical | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.5.x`/`0.6.x`/`0.7.0` versions of Apache Ranger | |
| | Users affected | Environments that use external location for hive tables | |
| | Description | Without Ranger Hive Authorizer checking RWX permission when external location is specified, there is a possibility that right permissions are not required to create the table | |
| | Fix detail | Ranger Hive Authorizer was updated to correctly handle permission check with external location | |
| | Mitigation | Users should upgrade to `0.7.1` or later version of Apache Ranger with the fix | |
| |
| ### Fixed in Ranger 0.6.3 |
| | CVE-2016-8746 | Apache Ranger path matching issue in policy evaluation | |
| |-------------------|------------------------------------------------------------------------------------------------------------------------------------------------| |
| | Severity | Normal | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.6.0`/`0.6.1`/`0.6.2` versions of Apache Ranger | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Ranger policy engine incorrectly matches paths in certain conditions when policy does not contain wildcards and has recursion flag set to true | |
| | Fix detail | Fixed policy evaluation logic | |
| | Mitigation | Users should upgrade to `0.6.3` or later version of Apache Ranger with the fix | |
| |
| | CVE-2016-8751 | Apache Ranger stored cross site scripting issue | |
| |-------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |
| | Severity | Normal | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.5.x` and `0.6.0`/`0.6.1`/`0.6.2` versions of Apache Ranger | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Apache Ranger was found to be vulnerable to a Stored Cross-Site Scripting in when entering custom policy conditions. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies | |
| | Fix detail | Added logic to sanitize the user input | |
| | Mitigation | Users should upgrade to `0.6.3` or later version of Apache Ranger with the fix | |
| |
| ### Fixed in Ranger 0.6.2 |
| | CVE-2016-6815 | Apache Ranger user privilege vulnerability | |
| |-------------------|-------------------------------------------------------------------------------------------------| |
| | Severity | Normal | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | All `0.5.x` versions or `0.6.0`/`0.6.1` versions of Apache Ranger | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Users with "keyadmin" role should not be allowed to change password for users with `admin` role | |
| | Fix detail | Added logic to validate the user privilege in the backend | |
| | Mitigation | Users should upgrade to `0.6.2` or later version of Apache Ranger with the fix | |
| |
| ### Fixed in Ranger 0.6.1 |
| | CVE-2016-5395 | Apache Ranger Stored Cross Site Scripting vulnerability | |
| |-------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |
| | Severity | Normal | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | All `0.5.x` versions of Apache Ranger and version `0.6.0` | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Apache Ranger was found to be vulnerable to a Stored Cross-Site Scripting in the create user functionality. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies | |
| | Fix detail | Added logic to sanitize the user input | |
| | Mitigation | Users should upgrade to `0.6.1` or later version of Apache Ranger with the fix | |
| | Credit | Thanks to Victor Hora from Securus Global for reporting this issue | |
| |
| ### Fixed in Ranger 0.5.3 |
| | CVE-2016-2174 | Apache Ranger sql injection vulnerability | |
| |-------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |
| | Severity | Normal | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | All versions of Apache Ranger from `0.5.0` (up to `0.5.3`) | |
| | Users affected | All admin users of ranger policy admin tool | |
| | Description | SQL Injection vulnerability in Audit > Access tab. When the user clicks an element from `policyId` row of the list, there is a call made underneath with eventTime parameter which contains the vulnerability. Admin users can send some arbitrary sql code to be executed along with eventTime parameter using `/service/plugins/policies/eventTime url` | |
| | Fix detail | Replaced native queries with JPA named queries | |
| | Mitigation | Users should upgrade to `0.5.3` version of Apache Ranger with the fix | |
| | Credit | Thanks to Mateusz Olejarka from SecuRing for reporting this issue | |
| |
| ### Fixed in Ranger 0.5.1 |
| | CVE-2015-5167 | Restrict REST API data access for non-admin users | |
| |-------------------|-------------------------------------------------------------------------------------------------------------------------------------| |
| | Severity | Important | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.4.0` and `0.5.0` version of Apache Ranger | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Data access restrictions via REST API are not consistent with restrictions in policy admin UI | |
| | Mitigation | Users should upgrade to Ranger `0.5.1` version | |
| |
| | CVE-2016-0733 | Ranger Admin authentication issue | |
| |-------------------|------------------------------------------------------------------------------------------------------------| |
| | Severity | Important | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.4.0` and `0.5.0` version of Apache Ranger | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Malicious Users can gain access to ranger admin UI without proper authentication | |
| | Mitigation | Users should upgrade to Ranger `0.5.1` version | |
| |
| ### Fixed in Ranger 0.5.0 |
| | CVE-2015-0265 | Apache Ranger code injection vulnerability | |
| |-------------------|------------------------------------------------------------------------------------------------------------| |
| | Severity | Important | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.4.0` version of Apache Ranger | |
| | Users affected | All admin users of ranger policy admin tool | |
| | Description | Unauthorized users can send some javascript code to be executed in ranger policy admin tool admin sessions | |
| | Fix detail | Added logic to sanitize the user input | |
| | Mitigation | Users should upgrade to `0.5.0+` version of Apache Ranger with the fix | |
| | Credit | Thanks to Jakub Kałużny from SecuRing for reporting this issue | |
| |
| | CVE-2015-0266 | Apache Ranger direct url access vulnerability | |
| |-------------------|------------------------------------------------------------------------------------------------------------| |
| | Severity | Important | |
| | Vendor | The Apache Software Foundation | |
| | Versions Affected | `0.4.0` version of Apache Ranger | |
| | Users affected | All users of ranger policy admin tool | |
| | Description | Regular users can type in the URL of modules that are accessible only to admin users | |
| | Fix detail | Added logic in the backend to verify user access | |
| | Mitigation | Users should upgrade to `0.5.0+` version of Apache Ranger with the fix | |
| | Credit | Thanks to Jakub Kałużny from SecuRing for reporting this issue | |