We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-23454

Apache Hadoop: Temporary File Local Information Disclosure



Description

Apache Hadoop’s RunJar.run() does not set permissions for temporary directory by default. If sensitive data will be present in this file, all the other local users may be able to view the content. This is because, on unix-like systems, the system temporary directory is shared between all local users. As such, files written in this directory, without setting the correct posix permissions explicitly, may be viewable by all other local users.

Reserved 2024-01-17 | Published 2024-09-25 | Updated 2024-11-05 | Assigner apache

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

Any version before 3.4.0
affected

Credits

Andrea Cosentino finder

References

issues.apache.org/jira/browse/HADOOP-19031 issue-tracking

lists.apache.org/thread/xlo7q8kn4tsjvx059r789oz19hzgfkfs vendor-advisory

cve.org (CVE-2024-23454)

nvd.nist.gov (CVE-2024-23454)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-23454

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.