#VU40136 Improper access control in sentry


Published: 2016-08-20 | Updated: 2020-08-09

Vulnerability identifier: #VU40136

Vulnerability risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-0760

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
sentry
Other software / Other software solutions

Vendor: Sentry

Description

The vulnerability allows a remote authenticated user to execute arbitrary code.

Multiple incomplete blacklist vulnerabilities in Apache Sentry before 1.7.0 allow remote authenticated users to execute arbitrary code via the (1) reflect, (2) reflect2, or (3) java_method Hive builtin functions.

Mitigation
Install update from vendor's website.

Vulnerable software versions

sentry: 1.5.1 - 1.6.0


External links
http://mail-archives.apache.org/mod_mbox/sentry-dev/201608.mbox/%3CCACMN7ixDqDyOZGLEvsMUVHBiJ6crq8zdy%2B2mNfRooNhnk7CJ1g%40mail.gmail.com%3E
http://www.securityfocus.com/bid/92328


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability