[ 
https://issues.apache.org/jira/browse/HADOOP-19764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Steve Loughran updated HADOOP-19764:
------------------------------------
    Description: 
https://github.com/advisories/GHSA-x44p-gvrj-pj2r

Note: this CVE only becomes possible 
* S3A Connector is being used with S3-CSE client side encryption
* When the encrypted data key (EDK) is stored in an "Instruction File" instead 
of S3's metadata record
* the attacker has write access to the bucket.

This is pretty niche. If the attacker has write access to the bucket, they can 
do a lot of damage, including create entirely new files.

CVSS-B 6.0 MEDIUM
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N


  was:

https://github.com/advisories/GHSA-x44p-gvrj-pj2r

Note: this CVE only becomes possible 
* S3A Connector is being used with S3-CSE client side encryption
* When the encrypted data key (EDK) is stored in an "Instruction File" instead 
of S3's metadata record
* the attacker has write access to the bucket.

This is pretty niche. If the attacker has write access to the bucket, they can 
do a lot of damage


> upgrade amazon-s3-encryption-client-java to 4.0.0+ due to Invisible 
> Salamanders (CVE-2025-14763)
> ------------------------------------------------------------------------------------------------
>
>                 Key: HADOOP-19764
>                 URL: https://issues.apache.org/jira/browse/HADOOP-19764
>             Project: Hadoop Common
>          Issue Type: Task
>            Reporter: PJ Fanning
>            Assignee: PJ Fanning
>            Priority: Major
>              Labels: pull-request-available
>             Fix For: 3.5.0, 3.4.3
>
>
> https://github.com/advisories/GHSA-x44p-gvrj-pj2r
> Note: this CVE only becomes possible 
> * S3A Connector is being used with S3-CSE client side encryption
> * When the encrypted data key (EDK) is stored in an "Instruction File" 
> instead of S3's metadata record
> * the attacker has write access to the bucket.
> This is pretty niche. If the attacker has write access to the bucket, they 
> can do a lot of damage, including create entirely new files.
> CVSS-B 6.0 MEDIUM
> CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to