{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T02:47:59.312","vulnerabilities":[{"cve":{"id":"CVE-2023-50380","sourceIdentifier":"security@apache.org","published":"2024-02-27T17:15:11.300","lastModified":"2025-03-27T20:15:20.650","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue.\n\nMore Details:\n\nOozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation.\n\nThis vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges."},{"lang":"es","value":"Inyección de entidad externa XML en versiones de Apache Ambari &lt;= 2.7.7. Se recomienda a los usuarios actualizar a la versión 2.7.8, que soluciona este problema. Más detalles: Oozie Workflow Scheduler tenía una vulnerabilidad que permitía la lectura de archivos a nivel raíz y la escalada de privilegios de usuarios con pocos privilegios. La vulnerabilidad se debió a la falta de una validación adecuada de la entrada del usuario. Esta vulnerabilidad se conoce como ataque de inyección de entidad externa XML (XXE). Los atacantes pueden aprovechar las vulnerabilidades de XXE para leer archivos arbitrarios en el servidor, incluidos archivos confidenciales del sistema. En teoría, podría ser posible utilizar esto para aumentar los privilegios."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*","versionStartIncluding":"2.7.0","versionEndExcluding":"2.7.8","matchCriteriaId":"92348BC0-F207-4660-A8AD-13714D0C09A2"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/02/27/6","source":"security@apache.org","tags":["Mailing List"]},{"url":"https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32","source":"security@apache.org","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/02/27/6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https://lists.apache.org/thread/qrt7mq7v7zyrh1qsh1gkg1m7clysvy32","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}