Apache Hadoop YARN ResourceManager Unauthenticated RCE (Remote) (Xbash)

critical Nessus Plugin ID 117615


The remote web server contains a web application that allows an API to run system commands without authentication.


The Apache Hadoop YARN ResourceManager running on the remote host is allowing unauthenticated users to create and execute applications. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP request, to potentially execute arbitrary code, subject to the user privileges of the executing node.


Configure ResourceManager API access control.

See Also


Plugin Details

Severity: Critical

ID: 117615

File Name: hadoop_resourcemanager_unauth_exec.nasl

Version: 1.3

Type: remote

Family: CGI abuses

Published: 9/20/2018

Updated: 3/6/2019

Risk Information

CVSS Score Rationale: Remote code execution on nodes


Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: manual


Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:apache:hadoop

Required KB Items: installed_sw/YARN ResourceManager

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 10/19/2016

Exploitable With

Metasploit (Hadoop YARN ResourceManager Unauthenticated Command Execution)