Description
ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used.
Remediation
References
https://lists.apache.org/thread/g6vf2h4wdgzzdgk91mqozhs58wotq150
https://security.netapp.com/advisory/ntap-20221201-0003/
Related Vulnerabilities
CVE-2021-31408 Vulnerability in maven package com.vaadin:flow-client
CVE-2019-10461 Vulnerability in maven package org.jenkins-ci.plugins:dynatrace-dashboard
CVE-2022-46175 Vulnerability in maven package org.webjars.bower:json5
CVE-2020-7238 Vulnerability in maven package io.netty:netty-codec-http
CVE-2022-4361 Vulnerability in maven package org.keycloak:keycloak-services