|Category:||Web application abuses|
|Title:||Apache Hadoop before 3.1.1, 3.0.3, 2.8.5, 2.7.7 Zip Slip Vulnerability|
|Summary:||Apache Hadoop is prone to the 'Zip Slip' Vulnerability.|
Apache Hadoop is prone to the 'Zip Slip' Vulnerability.
The vulnerability is exploited using a specially crafted archive that
holds directory traversal filenames (e.g. ../../evil.sh). The Zip Slip vulnerability can affect numerous archive formats,
including tar, jar, war, cpio, apk, rar and 7z.
Zip Slip is a form of directory traversal that can be exploited by extracting files from an archive.
The premise of the directory traversal vulnerability is that an attacker can gain access to parts of the file system outside of the
target folder in which they should reside. The attacker can then overwrite executable files and either invoke them remotely or wait
for the system or user to call them, thus achieving remote command execution on the victim's machine. The vulnerability can also cause
damage by overwriting configuration files or other sensitive resources, and can be exploited on both client (user) machines and servers.
Apache Hadoop versions 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11.
Update to version 3.1.1, 3.0.3, 2.8.5 or 2.7.7 respectively.
Common Vulnerability Exposure (CVE) ID: CVE-2018-8009|
BugTraq ID: 105927
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.