CVE-2015-5167: Apache Ranger allows users to bypass intended access restrictions via the REST API
(updated )
The Policy Admin Tool in Apache Ranger before 0.5.1 allows remote authenticated users to bypass intended access restrictions via the REST API.
References
- cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger
- github.com/advisories/GHSA-qqg7-gcxw-gmj3
- github.com/apache/ranger
- mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel%40apache.org%3E
- mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel@apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2015-5167
- web.archive.org/web/20200501000000*/http://www.securityfocus.com/bid/82871
Code Behaviors & Features
Detect and mitigate CVE-2015-5167 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →