Description
ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6622 | ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used. |
Github GHSA |
GHSA-rr2m-gffv-mgrj | Deserialization of Untrusted Data in Apache Hadoop YARN |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T20:11:28.113Z
Reserved: 2021-01-20T00:00:00.000Z
Link: CVE-2021-25642
No data.
Status : Modified
Published: 2022-08-25T14:15:09.067
Modified: 2024-11-21T05:55:11.800
Link: CVE-2021-25642
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA