Vulnerabilities
Vulnerable Software
Wisc:  >> Htcondor  >> 8.8.4  Security Vulnerabilities
An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon.
CVSS Score
8.8
EPSS Score
0.002
Published
2022-04-06
An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.
CVSS Score
8.1
EPSS Score
0.004
Published
2021-12-16
HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)
CVSS Score
9.8
EPSS Score
0.028
Published
2020-04-27


Contact Us

Shodan ® - All rights reserved