CVE-2019-18894

Current Description

HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)

Basic Data

PublishedApril 27, 2020
Last ModifiedMay 22, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-287
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationWiscHtcondor********8.8.08.8.6
    2.3ApplicationWiscHtcondor********8.9.08.9.4
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFedoraprojectFedora30*******
    2.3OSFedoraprojectFedora31*******
    2.3OSFedoraprojectFedora32*******

Vulnerable Software List

VendorProductVersions
Wisc Htcondor *
Fedoraproject Fedora 30, 31, 32

References

NameSourceURLTags
FEDORA-2020-ae934f6790https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EOTJFEDORAMailing List Third Party Advisory
FEDORA-2020-f9a598f815https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BL5YCFEDORAMailing List Third Party Advisory
FEDORA-2020-fb5af97476https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMPZ7FEDORAMailing List Third Party Advisory
https://research.cs.wisc.edu/htcondor/https://research.cs.wisc.edu/htcondor/MISCProduct
https://research.cs.wisc.edu/htcondor/new.htmlhttps://research.cs.wisc.edu/htcondor/new.htmlMISCRelease Notes Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001.htmlhttps://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0001.htmlMISCMitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002.htmlhttps://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0002.htmlMISCMitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003.htmlhttps://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0003.htmlCONFIRMMitigation Vendor Advisory
https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004.htmlhttps://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2020-0004.htmlMISCVendor Advisory