Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15087
HistoryJun 30, 2020 - 4:35 p.m.

CVE-2020-15087 Privilege escalation in Presto

2020-06-3016:35:15
CWE-285
GitHub_M
www.cve.org

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.8%

In Presto before version 337, authenticated users can bypass authorization checks by directly accessing internal APIs. This impacts Presto server installations with secure internal communication configured. This does not affect installations that have not configured secure internal communication, as these installations are inherently insecure. This only affects Presto server installations. This does NOT affect clients such as the CLI or JDBC driver. This vulnerability has been fixed in version 337. Additionally, this issue can be mitigated by blocking network access to internal APIs on the coordinator and workers.

CNA Affected

[
  {
    "product": "Presto",
    "vendor": "prestosql",
    "versions": [
      {
        "status": "affected",
        "version": "< 337"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.8%

Related for CVELIST:CVE-2020-15087