Vulnerability Name:

CVE-2009-4133 (CCN-54984)

Assigned:2009-12-22
Published:2009-12-22
Updated:2021-07-15
Summary:Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
4.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Bypass Security
References:Source: MISC
Type: UNKNOWN
http://condor-wiki.cs.wisc.edu/index.cgi/tktview?tn=1018

Source: MITRE
Type: CNA
CVE-2009-4133

Source: CCN
Type: RHSA-2009-1688
Moderate: condor security update

Source: CCN
Type: RHSA-2009-1689
Moderate: condor security update

Source: CCN
Type: SA37766
Condor Job Management Security Bypass Vulnerability

Source: SECUNIA
Type: Vendor Advisory
37766

Source: SECUNIA
Type: Vendor Advisory
37803

Source: CCN
Type: SECTRACK ID: 1023378
Condor Job Management Flaw Lets Local Users Gain Elevated Privileges

Source: SECTRACK
Type: UNKNOWN
1023378

Source: CCN
Type: Condor Release Web Site
8.3 Stable Release Series 7.4

Source: CONFIRM
Type: Vendor Advisory
http://www.cs.wisc.edu/condor/manual/v7.4/8_3Stable_Release.html#SECTION00931000000000000000

Source: CONFIRM
Type: Vendor Advisory
http://www.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2009-0001.html

Source: CCN
Type: OSVDB ID: 61246
Condor Job Management Restriction Bypass Arbitrary Command Execution

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1688

Source: REDHAT
Type: UNKNOWN
RHSA-2009:1689

Source: BID
Type: UNKNOWN
37443

Source: CCN
Type: BID-37443
Condor Job Submission Security Bypass Vulnerability

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=544371

Source: XF
Type: UNKNOWN
condor-jobs-security-bypass(54984)

Source: XF
Type: UNKNOWN
condor-jobs-security-bypass(54984)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:condor_project:condor:7.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_mrg:1.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    condor_project condor 7.2.4
    condor_project condor 7.2.3
    condor_project condor 7.1.0
    condor_project condor 7.0.6
    condor_project condor 6.8.5
    condor_project condor 6.8.6
    condor_project condor 7.0.1
    condor_project condor 7.0.3
    condor_project condor 7.2.2
    condor_project condor 7.2.1
    condor_project condor 6.5.4
    condor_project condor 7.1.4
    condor_project condor 6.8.1
    condor_project condor 7.1.3
    condor_project condor 6.8.4
    condor_project condor 7.1.1
    condor_project condor 7.0.0
    condor_project condor 7.3.2
    condor_project condor 7.2.0
    condor_project condor 7.3.0
    condor_project condor 6.8.9
    condor_project condor 6.8.0
    condor_project condor 6.8.7
    condor_project condor 6.8.3
    condor_project condor 7.0.5
    condor_project condor 7.0.2
    condor_project condor 7.4.0
    condor_project condor 7.3.1
    condor_project condor 7.1.2
    condor_project condor 6.8.8
    condor_project condor 7.0.4
    condor_project condor 6.8.2
    redhat enterprise mrg 1.2