Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "48775266-A48C-43C7-91DE-A823148F10B4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "819AE29E-1B9A-472B-89AD-B59FB3DF67D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F1C4CA7-A2B6-487B-98D1-62A8ED5A9832", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4CDD233-EC67-4CE1-973A-A3EFD88F679C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloudera:cloudera_manager:5.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "60C4DE1F-5942-4948-9732-6BCED81C4A5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloudera:navigator_key_trustee_kms:5.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B2EFA33-6959-4EA9-A57F-E26B134DA310", "vulnerable": true}, {"criteria": "cpe:2.3:a:cloudera:navigator_key_trustee_kms:5.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7628F61-91CE-401E-B443-741A1CEA1BF9", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "In Cloudera Navigator Key Trustee KMS 5.12 and 5.13, incorrect default ACL values allow remote access to purge and undelete API calls on encryption zone keys. The Navigator Key Trustee KMS includes 2 API calls in addition to those in Apache Hadoop KMS: purge and undelete. The KMS ACL values for these commands are keytrustee.kms.acl.PURGE and keytrustee.kms.acl.UNDELETE respectively. The default value for the ACLs in Key Trustee KMS 5.12.0 and 5.13.0 is \"*\" which allows anyone with knowledge of the name of an encryption zone key and network access to the Key Trustee KMS to make those calls against known encryption zone keys. This can result in the recovery of a previously deleted, but not purged, key (undelete) or the deletion of a key in active use (purge) resulting in loss of access to encrypted HDFS data."}, {"lang": "es", "value": "En Cloudera Navigator Key Trustee KMS versiones 5.12 y 5.13, los valores de ACL por defecto incorrectos permiten el acceso remoto para purgar y recuperar llamadas de la API en claves de zona de cifrado. El Navigator Key Trustee KMS incluye 2 llamadas a la API adem\u00e1s de las de Apache Hadoop KMS: purgar y recuperar. Los valores de ACL de KMS para estos comandos son keytrustee.kms.acl.PURGE y keytrustee.kms.acl.UNDELETE, respectivamente. El valor predeterminado para las ACL en la versi\u00f3n 5.12.0 de Key Trustee KMS versiones 5.12.0 and 5.13.0 es \"*\" que permite a cualquier persona con conocimiento del nombre de una clave de zona de cifrado y acceso de red al Key Trustee KMS para realizar esas llamadas contra claves de zona de cifrado conocidas. Esto puede resultar en la recuperaci\u00f3n de una clave previamente eliminada, pero no purgada (Undelete) o la eliminaci\u00f3n de una clave en uso activo (purga), resultando en la p\u00e9rdida de acceso a los datos de HDFS cifrados."}], "id": "CVE-2018-6185", "lastModified": "2024-11-21T04:10:14.727", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-06-07T15:29:00.793", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.cloudera.com"}, {"source": "cve@mitre.org", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.cloudera.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/Security-Bulletin.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-310"}], "source": "nvd@nist.gov", "type": "Primary"}]}