hadoop-unauth-rce: Apache Hadoop YARN ResourceManager - Remote Code Execution

日期: 2025-08-01 | 影响软件: Apache Hadoop YARN ResourceManager | POC: 已公开

漏洞描述

Apache Hadoop YARN ResourceManager is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

PoC代码[已公开]

id: hadoop-unauth-rce

info:
  name: Apache Hadoop YARN ResourceManager - Remote Code Execution
  author: pdteam,Couskito
  severity: critical
  description: |
    Apache Hadoop YARN ResourceManager is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
  reference:
    - http://archive.hack.lu/2016/Wavestone%20-%20Hack.lu%202016%20-%20Hadoop%20safari%20-%20Hunting%20for%20vulnerabilities%20-%20v1.0.pdf
    - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/hadoop_unauth_exec.rb
    - https://github.com/vulhub/vulhub/tree/master/hadoop/unauthorized-yarn
    - https://github.com/Al1ex/Hadoop-Yarn-ResourceManager-RCE
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cwe-id: CWE-306
  metadata:
    max-request: 1
  tags: vulhub,apache,hadoop,unauth,rce,msf,misconfig,vuln

http:
  - method: POST
    path:
      - "{{BaseURL}}/ws/v1/cluster/apps/new-application"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - '"application-id"'

      - type: status
        status:
          - 200
# digest: 490a00463044022069069341408d15589a860bc8087f275db76637b090a02717f3ad0c9ef4479025022066f53828a314263eb23dc1dbbe9b592e242d184693e135f3dd53ff9fbcf764e1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐