Vulnerability Description
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Ranger | <= 0.5.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/82871
- https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+RangVendor Advisory
- https://issues.apache.org/jira/browse/RANGER-835Vendor Advisory
- https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114
- http://www.securityfocus.com/bid/82871
- https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+RangVendor Advisory
- https://issues.apache.org/jira/browse/RANGER-835Vendor Advisory
- https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114
FAQ
What is CVE-2016-0733?
CVE-2016-0733 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a va...
How severe is CVE-2016-0733?
CVE-2016-0733 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-0733?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Ranger.