Apache Hadoop YARN ResourceManager Unauthenticated RCE (Remote) (Xbash)

critical Nessus Plugin ID 117615
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote web server contains a web application that allows an API to run system commands without authentication.

Description

The Apache Hadoop YARN ResourceManager running on the remote host is allowing unauthenticated users to create and execute applications. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP request, to potentially execute arbitrary code, subject to the user privileges of the executing node.

Solution

Configure ResourceManager API access control.

See Also

http://www.nessus.org/u?57624ec9

Plugin Details

Severity: Critical

ID: 117615

File Name: hadoop_resourcemanager_unauth_exec.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 9/20/2018

Updated: 3/6/2019

Dependencies: os_fingerprint.nasl, hadoop_resourcemanager_web_detect.nasl

Risk Information

CVSS Score Source: manual

CVSS Score Rationale: Remote code execution on nodes

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:a:apache:hadoop:*:*:*:*:*:*:*:*

Required KB Items: installed_sw/YARN ResourceManager

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 10/19/2016

Exploitable With

Metasploit (Hadoop YARN ResourceManager Unauthenticated Command Execution)