Apache Hadoop YARN ResourceManager Unauthenticated RCE (Remote) (Xbash)

critical Nessus Plugin ID 117615

Synopsis

The remote web server contains a web application that allows an API to run system commands without authentication.

Description

The Apache Hadoop YARN ResourceManager running on the remote host is allowing unauthenticated users to create and execute applications. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP request, to potentially execute arbitrary code, subject to the user privileges of the executing node.

Solution

Configure ResourceManager API access control.

See Also

http://www.nessus.org/u?57624ec9

Plugin Details

Severity: Critical

ID: 117615

File Name: hadoop_resourcemanager_unauth_exec.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 9/20/2018

Updated: 3/6/2019

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Remote code execution on nodes

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:apache:hadoop

Required KB Items: installed_sw/YARN ResourceManager

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 10/19/2016

Exploitable With

Metasploit (Hadoop YARN ResourceManager Unauthenticated Command Execution)