Vulnerabilities
Vulnerable Software
Condor Project:  >> Condor  >> 6.5.4  Security Vulnerabilities
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
CVSS Score
10.0
EPSS Score
0.045
Published
2012-08-25
Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute.
CVSS Score
6.5
EPSS Score
0.014
Published
2009-12-23


Contact Us

Shodan ® - All rights reserved