CVE-2020-15087

In Presto before version 337, authenticated users can bypass authorization checks by directly accessing internal APIs. This impacts Presto server installations with secure internal communication configured. This does not affect installations that have not configured secure internal communication, as these installations are inherently insecure. This only affects Presto server installations. This does NOT affect clients such as the CLI or JDBC driver. This vulnerability has been fixed in version 337. Additionally, this issue can be mitigated by blocking network access to internal APIs on the coordinator and workers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:prestosql:presto:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 8.8
v2 : 6.5
v3 : 7.4
References () https://github.com/prestosql/presto/security/advisories/GHSA-f6pc-crhh-cp96 - Third Party Advisory () https://github.com/prestosql/presto/security/advisories/GHSA-f6pc-crhh-cp96 - Third Party Advisory
References () https://trino.io/docs/current/release/release-337.html#security-changes - Release Notes, Vendor Advisory () https://trino.io/docs/current/release/release-337.html#security-changes - Release Notes, Vendor Advisory

Information

Published : 2020-06-30 17:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-15087

Mitre link : CVE-2020-15087

CVE.ORG link : CVE-2020-15087


JSON object : View

Products Affected

prestosql

  • presto
CWE
CWE-285

Improper Authorization

NVD-CWE-Other