[ 
https://issues.apache.org/jira/browse/HADOOP-19325?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Steve Loughran resolved HADOOP-19325.
-------------------------------------
    Resolution: Not A Problem

> hadoop-rumen is vulnerable to Sonatype CWE611
> ---------------------------------------------
>
>                 Key: HADOOP-19325
>                 URL: https://issues.apache.org/jira/browse/HADOOP-19325
>             Project: Hadoop Common
>          Issue Type: Task
>          Components: security, tools
>    Affects Versions: 3.4.0, 3.3.6, 3.4.1
>            Reporter: Palakur Eshwitha Sai
>            Priority: Major
>
> hadoop-rumen is vulnerable to CWE-611: [Improper Restriction of XML External 
> Entity Reference.|https://cwe.mitre.org/data/definitions/611.html]
> Explanation: The Apache {{hadoop-common}} and {{hadoop-rumen}} packages are 
> vulnerable to XML External Entity (XXE) attacks. The 
> {{readXmlFileToMapWithFileInputStream()}} method in the {{HostsFileReader}} 
> class, the {{parse()}} method in the {{JobConfigurationParser}} class, and 
> the constructor in the {{ParsedConfigFile}} class process malicious external 
> entities by default due to an unsafe XML parser configuration. A remote 
> attacker who can supply or modify the contents of hosts or configuration XML 
> files parsed by these packages can exploit this vulnerability to exfiltrate 
> information, cause a Denial of Service (DoS) condition, or perform other 
> XXE-related attacks.
> Root Cause: org/apache/hadoop/tools/rumen/JobConfigurationParser.class, 
> org/apache/hadoop/tools/rumen/ParsedConfigFile.class



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: common-dev-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-dev-h...@hadoop.apache.org

Reply via email to