Vulnerabilites related to apache - oozie
CVE-2017-15712 (GCVE-0-2017-15712)
Vulnerability from cvelistv5
Published
2018-02-19 14:00
Modified
2024-09-17 01:46
Severity ?
CWE
  • Information Disclosure
Summary
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 4.3.0 and 5.0.0-beta1 to expose private files on the Oozie server process. The malicious user can construct a workflow XML file containing XML directives and configuration that reference sensitive files on the Oozie server host.
Impacted products
Vendor Product Version
Apache Software Foundation Apache Oozie Version: 3.1.3-incubating to 4.3.0
Version: 5.0.0-beta1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T20:04:49.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103102",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103102"
          },
          {
            "name": "[dev] 20180215 [CVE-2017-15712] Apache Oozie Server vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/4606709264fe7cb0285e2a12aca2d01a06b14cd58791c9fc32abd216%40%3Cdev.oozie.apache.org%3E"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Apache Oozie",
          "vendor": "Apache Software Foundation",
          "versions": [
            {
              "status": "affected",
              "version": "3.1.3-incubating to 4.3.0"
            },
            {
              "status": "affected",
              "version": "5.0.0-beta1"
            }
          ]
        }
      ],
      "datePublic": "2018-02-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 4.3.0 and 5.0.0-beta1 to expose private files on the Oozie server process. The malicious user can construct a workflow XML file containing XML directives and configuration that reference sensitive files on the Oozie server host."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-22T10:57:01",
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache"
      },
      "references": [
        {
          "name": "103102",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103102"
        },
        {
          "name": "[dev] 20180215 [CVE-2017-15712] Apache Oozie Server vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/4606709264fe7cb0285e2a12aca2d01a06b14cd58791c9fc32abd216%40%3Cdev.oozie.apache.org%3E"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@apache.org",
          "DATE_PUBLIC": "2018-02-15T00:00:00",
          "ID": "CVE-2017-15712",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Apache Oozie",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.1.3-incubating to 4.3.0"
                          },
                          {
                            "version_value": "5.0.0-beta1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apache Software Foundation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 4.3.0 and 5.0.0-beta1 to expose private files on the Oozie server process. The malicious user can construct a workflow XML file containing XML directives and configuration that reference sensitive files on the Oozie server host."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103102",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103102"
            },
            {
              "name": "[dev] 20180215 [CVE-2017-15712] Apache Oozie Server vulnerability",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/4606709264fe7cb0285e2a12aca2d01a06b14cd58791c9fc32abd216@%3Cdev.oozie.apache.org%3E"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "cveId": "CVE-2017-15712",
    "datePublished": "2018-02-19T14:00:00Z",
    "dateReserved": "2017-10-21T00:00:00",
    "dateUpdated": "2024-09-17T01:46:21.738Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-26796 (GCVE-0-2025-26796)
Vulnerability from cvelistv5
Published
2025-03-22 12:23
Modified
2025-03-24 14:05
Severity ?
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Oozie. This issue affects Apache Oozie: all versions. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-03-22T13:06:10.947Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2025/03/21/1"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-26796",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-24T14:04:20.991181Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-24T14:05:19.477Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Apache Oozie",
          "vendor": "Apache Software Foundation",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Nikhil Daf"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in Apache Oozie.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Oozie: all versions.\u003c/p\u003e\u003cp\u003eAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\u003c/p\u003e\u003cp\u003eNOTE: This vulnerability only affects products that are no longer supported by the maintainer.\u003c/p\u003e"
            }
          ],
          "value": "** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in Apache Oozie.\n\nThis issue affects Apache Oozie: all versions.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "text": "moderate"
            },
            "type": "Textual description of severity"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-22T12:23:19.140Z",
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.apache.org/thread/fzrmsslnrpl0vpp0jr73fosmfjv4omdq"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned"
      ],
      "title": "Apache Oozie: XSS in Oozie Web Console",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "cveId": "CVE-2025-26796",
    "datePublished": "2025-03-22T12:23:19.140Z",
    "dateReserved": "2025-02-14T16:01:05.603Z",
    "dateUpdated": "2025-03-24T14:05:19.477Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-35451 (GCVE-0-2020-35451)
Vulnerability from cvelistv5
Published
2021-03-09 15:20
Modified
2025-02-13 16:27
Severity ?
CWE
  • CWE-377 - Insecure Temporary File
Summary
There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie's sharelib during it's creation.
Impacted products
Vendor Product Version
Apache Software Foundation Apache Oozie Version: unspecified   < 5.2.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:02:08.135Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
          },
          {
            "name": "[oozie-user] 20210309 CVE-2020-35451: Oozie local privilege escalation",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
          },
          {
            "name": "[oss-security] 20210309 CVE-2020-35451: Oozie local privilege escalation",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2021/03/09/2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Apache Oozie",
          "vendor": "Apache Software Foundation",
          "versions": [
            {
              "lessThan": "5.2.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "The Apache Oozie PMC would like to thank Jonathan Leitschuh for reporting the issue"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie\u0027s sharelib during it\u0027s creation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-377",
              "description": "CWE-377 Insecure Temporary File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-04T17:03:39.000Z",
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
        },
        {
          "name": "[oozie-user] 20210309 CVE-2020-35451: Oozie local privilege escalation",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
        },
        {
          "name": "[oss-security] 20210309 CVE-2020-35451: Oozie local privilege escalation",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2021/03/09/2"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Oozie local privilege escalation",
      "workarounds": [
        {
          "lang": "en",
          "value": "Validate the contents of the sharelib after uploading."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@apache.org",
          "ID": "CVE-2020-35451",
          "STATE": "PUBLIC",
          "TITLE": "Oozie local privilege escalation"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Apache Oozie",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "5.2.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apache Software Foundation"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "The Apache Oozie PMC would like to thank Jonathan Leitschuh for reporting the issue"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie\u0027s sharelib during it\u0027s creation."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-377 Insecure Temporary File"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E",
              "refsource": "MISC",
              "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
            },
            {
              "name": "[oozie-user] 20210309 CVE-2020-35451: Oozie local privilege escalation",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5@%3Cuser.oozie.apache.org%3E"
            },
            {
              "name": "[oss-security] 20210309 CVE-2020-35451: Oozie local privilege escalation",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2021/03/09/2"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Validate the contents of the sharelib after uploading."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "cveId": "CVE-2020-35451",
    "datePublished": "2021-03-09T15:20:13.000Z",
    "dateReserved": "2020-12-14T00:00:00.000Z",
    "dateUpdated": "2025-02-13T16:27:42.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-11799 (GCVE-0-2018-11799)
Vulnerability from cvelistv5
Published
2018-12-19 20:00
Modified
2024-08-05 08:17
Severity ?
CWE
  • Gain Privileges
Summary
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name.
Impacted products
Vendor Product Version
Apache Software Foundation Apache Oozie Version: Apache Oozie 3.1.3-incubating to 5.0.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:17:09.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a%40%3Cuser.oozie.apache.org%3E"
          },
          {
            "name": "106266",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106266"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Apache Oozie",
          "vendor": "Apache Software Foundation",
          "versions": [
            {
              "status": "affected",
              "version": "Apache Oozie 3.1.3-incubating to 5.0.0"
            }
          ]
        }
      ],
      "datePublic": "2018-12-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user\u0027s name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Gain Privileges",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-21T10:57:01",
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a%40%3Cuser.oozie.apache.org%3E"
        },
        {
          "name": "106266",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106266"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@apache.org",
          "ID": "CVE-2018-11799",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Apache Oozie",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Apache Oozie 3.1.3-incubating to 5.0.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apache Software Foundation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user\u0027s name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Gain Privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E",
              "refsource": "MISC",
              "url": "https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E"
            },
            {
              "name": "106266",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106266"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "cveId": "CVE-2018-11799",
    "datePublished": "2018-12-19T20:00:00",
    "dateReserved": "2018-06-05T00:00:00",
    "dateUpdated": "2024-08-05T08:17:09.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2021-03-09 16:15
Modified
2024-11-21 05:27
Summary
There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie's sharelib during it's creation.
Impacted products
Vendor Product Version
apache oozie *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:oozie:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5827BB9E-5A87-4382-8CD4-CADD7708A5ED",
              "versionEndExcluding": "5.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie\u0027s sharelib during it\u0027s creation."
    },
    {
      "lang": "es",
      "value": "Se presenta una condici\u00f3n de carrera en OozieSharelibCLI en Apache Oozie versiones anteriores a 5.2.1, que permite a un atacante malicioso reemplazar los archivos en sharelib de Oozie durante su creaci\u00f3n"
    }
  ],
  "id": "CVE-2020-35451",
  "lastModified": "2024-11-21T05:27:18.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-03-09T16:15:13.787",
  "references": [
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/03/09/2"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2021/03/09/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "https://lists.apache.org/thread.html/r8688debdb8b586aab3e53dee2d675fc9212de0ec627a8d3cd43b5ab5%40%3Cuser.oozie.apache.org%3E"
    }
  ],
  "sourceIdentifier": "security@apache.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-377"
        }
      ],
      "source": "security@apache.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-19 14:29
Modified
2024-11-21 03:15
Summary
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 4.3.0 and 5.0.0-beta1 to expose private files on the Oozie server process. The malicious user can construct a workflow XML file containing XML directives and configuration that reference sensitive files on the Oozie server host.
Impacted products
Vendor Product Version
apache oozie 3.1.2
apache oozie 3.1.3
apache oozie 3.2
apache oozie 3.2.0
apache oozie 3.2.0
apache oozie 3.3.0
apache oozie 3.3.0
apache oozie 3.3.0
apache oozie 3.3.1
apache oozie 3.3.1
apache oozie 3.3.1
apache oozie 3.3.2
apache oozie 3.3.2
apache oozie 4.0.0
apache oozie 4.0.0
apache oozie 4.0.0
apache oozie 4.0.0
apache oozie 4.0.1
apache oozie 4.0.1
apache oozie 4.0.1
apache oozie 4.1.0
apache oozie 4.1.0
apache oozie 4.1.0
apache oozie 4.2.0
apache oozie 4.2.0
apache oozie 4.3.0
apache oozie 4.3.0
apache oozie 4.3.0
apache oozie 5.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E27E277-5C05-4A7F-8F3A-705A69CC64C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "553025E8-0C63-4884-AF2B-DE273495FEE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDD671D-4BB7-4E34-9FA3-9CBC5D8C72E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "61DE1BFA-1092-451C-8298-2B18E504C0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.2.0:incubating:*:*:*:*:*:*",
              "matchCriteriaId": "2E3F39F1-D6A4-4A3D-A599-BDA44C35F325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FB5A75F-E3D6-4473-ACC9-A395784E9257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.0:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "54AA2C05-D12A-40B2-9057-678DE35A26D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E7EF67B4-BAFB-487D-972C-258213C6A400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D645772-64AA-4D4D-9206-A858592E053D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.1:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "34085D87-5EE4-478D-8A6B-97E05F965AFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5682A48E-976D-4F0D-BA4C-63B42788500F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B0D2683-519E-4833-9A68-0EA11DF93829",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.3.2:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "4AA8E7A5-530A-4EEE-8613-ECD01CCFA0B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A0A49A-A1B4-4FEB-94E3-762E40A816E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.0.0:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "92AFFD7F-3B8F-4A06-9EF9-C1BFC6D97519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "160E96D4-289C-4021-B1D7-2EA9001150A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8DEC1364-33EE-41EB-8692-9039BA7D7969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A24D04C-CE3C-49FF-B340-D204CFF458E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.0.1:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "7EC90787-032C-48CC-BCAF-F1D0123B73B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "963D7266-7665-4849-867F-4DDEC8166813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE25673C-5D56-42CF-8611-E6189B6A7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.1.0:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "6343A815-8D76-458C-BB3E-2B095543DA2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6E2BC58D-1695-453B-809C-EAC92D2BDD24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "30F5CE52-B0A6-433E-B8C0-346A9E16FC7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.2.0:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "CF297DCD-64F6-4035-9998-010CEE6E59F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD866B64-C655-4FEA-B1DA-012A0AE5397F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.3.0:rc0:*:*:*:*:*:*",
              "matchCriteriaId": "39A5D900-5625-4653-BC46-B42E2BF97D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:4.3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C14F101-7DBA-4872-A055-45B0D6DE2F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:5.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "3C5FADBD-3A42-4BA4-A48E-3AB3AF941C48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 4.3.0 and 5.0.0-beta1 to expose private files on the Oozie server process. The malicious user can construct a workflow XML file containing XML directives and configuration that reference sensitive files on the Oozie server host."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad permite que un usuario de Apache Oozie desde la versi\u00f3n 3.1.3-incubating hasta la 4.3.0 y 5.0.0-beta1 exponga archivos privados en el proceso del servidor Oozie. Este usuario malicioso puede construir un archivo XML de flujo de trabajo que contenga directivas XML y configuraci\u00f3n que haga referencia a archivos sensibles en el host del servidor del Oozie."
    }
  ],
  "id": "CVE-2017-15712",
  "lastModified": "2024-11-21T03:15:03.943",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-19T14:29:00.207",
  "references": [
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103102"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/4606709264fe7cb0285e2a12aca2d01a06b14cd58791c9fc32abd216%40%3Cdev.oozie.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/4606709264fe7cb0285e2a12aca2d01a06b14cd58791c9fc32abd216%40%3Cdev.oozie.apache.org%3E"
    }
  ],
  "sourceIdentifier": "security@apache.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-03-22 13:15
Modified
2025-04-01 20:27
Summary
** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Oozie. This issue affects Apache Oozie: all versions. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Impacted products
Vendor Product Version
apache oozie *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:oozie:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5509D7E0-7E8A-400A-9E79-B2148ED25D58",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "security@apache.org",
      "tags": [
        "unsupported-when-assigned"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in Apache Oozie.\n\nThis issue affects Apache Oozie: all versions.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
    },
    {
      "lang": "es",
      "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (\u0027Cross-site Scripting\u0027) en Apache Oozie. Este problema afecta a todas las versiones de Apache Oozie. Dado que este proyecto est\u00e1 descontinuado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios buscar una alternativa o restringir el acceso a la instancia a usuarios de confianza. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
    }
  ],
  "id": "CVE-2025-26796",
  "lastModified": "2025-04-01T20:27:46.867",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-22T13:15:35.513",
  "references": [
    {
      "source": "security@apache.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://lists.apache.org/thread/fzrmsslnrpl0vpp0jr73fosmfjv4omdq"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2025/03/21/1"
    }
  ],
  "sourceIdentifier": "security@apache.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@apache.org",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-12-19 20:29
Modified
2024-11-21 03:44
Summary
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name.
Impacted products
Vendor Product Version
apache oozie *
apache oozie 3.1.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:oozie:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "287B5C86-AE53-44FE-95FB-09512E00C6AF",
              "versionEndExcluding": "5.1.0",
              "versionStartIncluding": "3.1.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:oozie:3.1.3:incubating:*:*:*:*:*:*",
              "matchCriteriaId": "C2DDDACA-F6D3-4143-8ADD-8FB30E80BC3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user\u0027s name."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad permite que un usuario de Apache Oozie, desde la versi\u00f3n 3.1.3-incubating hasta la 5.0.0, suplante a otros usuarios. El usuario malicioso puede construir un XML que resulta en que los workflows se ejecutan en nombre de otro usuario."
    }
  ],
  "id": "CVE-2018-11799",
  "lastModified": "2024-11-21T03:44:03.500",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-12-19T20:29:00.230",
  "references": [
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106266"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a%40%3Cuser.oozie.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a%40%3Cuser.oozie.apache.org%3E"
    }
  ],
  "sourceIdentifier": "security@apache.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}