Yiheng Cao created STORM-4002:
---------------------------------

             Summary: Security Vulnerability - Action Required: “Incorrect 
Permission Assignment for Critical Resource” vulnerability in some components 
of  org.apache.storm
                 Key: STORM-4002
                 URL: https://issues.apache.org/jira/browse/STORM-4002
             Project: Apache Storm
          Issue Type: Bug
          Components: storm-kafka, storm-starter
    Affects Versions: 1.2.2, 1.1.3, 1.2.1, 1.1.2, 1.2.0, 1.1.1, 1.1.0
            Reporter: Yiheng Cao


 I think the method 
org.apache.hadoop.mapreduce.filecache.ClientDistributedCacheManager.checkPermissionOfOther(FileSystem
 fs, Path path, FsAction action, Map<URI, FileStatus> statCache) may have an 
“Incorrect Permission Assignment for Critical Resource”vulnerability which is 
vulnerable in in some components of  org.apache.storm. It shares similarities 
to a recent CVE disclosure _CVE-2017-3166_ in the project _"apache/hadoop"_ 
project. The influencing components are listed below:
 # org.apache.storm:storm-kafka-examples in the versions between 1.1.0 and 
1.2.4.
 # org.apache.storm:storm-starter in the versions of 1.1.2-1.1.3 and 1.2.0-1.2.2

The source vulnerability information is as follows: 
!https://mail.google.com/mail/u/0?ui=2&ik=35947afd70&attid=0.1&permmsgid=msg-f:1782522681557497681&th=18bccaef464fb751&view=fimg&fur=ip&sz=s0-l75-ft&attbid=ANGjdJ_bBS_0CMiL9kNUgnr95IJelNJAQJp906nnAonpFswrxMbSt1EVV1S2q6kq_ur-YE-1H49gOCjMGqFYtm5xBOS_EBOZci8ukIw2Hn8kM-9OIKVIxXrlhcRm6LA&disp=emb&realattid=ii_lmt56kbv0|width=1,height=1!!https://mail.google.com/mail/u/0?ui=2&ik=35947afd70&attid=0.2&permmsgid=msg-f:1782522681557497681&th=18bccaef464fb751&view=fimg&fur=ip&sz=s0-l75-ft&attbid=ANGjdJ-8wPNUdQ35WBKaadck2X1lP34blTQ_qiyhu5T7l0G8T4cboSCiFNgfxaCQZZsK-Pm3ebzj4JSWBs558OxWHJPM1uJqKlMvPMhpx9J0TiojhC85DNqeLu3dr2Q&disp=emb&realattid=ii_lmt6415i0|width=1,height=1!!https://mail.google.com/mail/u/0?ui=2&ik=35947afd70&attid=0.0.1&permmsgid=msg-f:1782522681557497681&th=18bccaef464fb751&view=fimg&fur=ip&sz=s0-l75-ft&attbid=ANGjdJ9XERxykP1zaB9Codaz3lisQ9gKwLHXnEIHP4p4oUcINmdFEWTJAWeDMfayncBsWIBj_kc2cAKHx4c7InMtKL98nDb2Dnt3TpfGLQCcJhdFsSBhemVA14CI0rA&disp=emb&realattid=ii_loxzzieb0|width=1,height=1!

*Vulnerability Detail:*

*CVE Identifier:* CVE-2017-3166

{*}Description{*}: In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, 
and 3.0.0-alpha1, if a file in an encryption zone with access permissions that 
make it world readable is localized via YARN's localization mechanism, that 
file will be stored in a world-readable location and can be shared freely with 
any application that requests to localize that file.

*Reference:*[ |http://goog_608275719/] 
[https://nvd.nist.gov/vuln/detail/CVE-2017-3166]

{*}Patch{*}: 
[https://github.com/apache/hadoop/commit/a47d8283b136aab5b9fa4c18e6f51fa799d91a29]
*Vulnerability Description:* The vulnerability is present in the class  
org.apache.hadoop.mapreduce.filecache.ClientDistributedCacheManager  of method  
checkPermissionOfOther(FileSystem fs, Path path, FsAction action, Map<URI, 
FileStatus> statCache)  , which is responsible for checking the permissions of 
other files in the distributed cache.. {*}But t{*}{*}he check snippet is 
similar to the vulnerable snippet for CVE-2017-3166{*} and may have the same 
consequence as CVE-2017-3166: {*}a file in an encryption zone with access 
permissions  will be stored in a world-readable location and can be freely 
shared with any application that requests the file to be localized{*}. 
Therefore, maybe you need to fix the vulnerability with much the same fix code 
as the CVE-2017-3166 patch. 
    Considering the potential risks it may have, I am willing to cooperate with 
you to verify, address, and report the identified vulnerability promptly 
through responsible means. If you require any further information or 
assistance, please do not hesitate to reach out to me. Thank you and look 
forward to hearing from you soon.
 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to