CVE-2015-1775: Apache Ambari Server Side Request Forgery vulnerability

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: 1.5.0 to 2.0.2

Versions Fixed: 2.1.0

Description: Ambari exposes a proxy endpoint through “api/v1/proxy” that can be 
used make REST calls to arbitrary host:port that are accessible from the Ambari 
server host. Ability to make these calls is limited to Ambari authenticated 
users only. In addition, an user need to be Ambari admin user to make the REST 
calls using METHODs other than GET (non-admin users can only call GET). This 
ability to call allows malicious users to perform port scans and/or access 
unsecured services visible to the Ambari Server host through the proxy 
endpoint. In addition Ambari provides an utility to handle such proxy calls 
that are used by View instances hosted by Ambari

Mitigation: Ambari users should upgrade to version 2.1.0 or above. Version 
2.1.0 onwards the proxy end point (api/v1/proxy) has been disabled. In addition 
a configurable parameter (proxy.allowed.hostports) is introduced, in config 
file ambari.properties, to explicitly specify a list of host/port that can be 
proxied to when using the utility.

Credit: This issue was discovered by  Mateusz Olejarka (SecuRing).

References: 
https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities

Reply via email to