logo

CVE-2020-15087 io.prestosql:presto-server

Package

Manager: maven
Name: io.prestosql:presto-server
Vulnerable Version: >=0 <337

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00135 pctl0.34066

Details

Privilege escalation in Presto ### Affected This affects Presto server installations. This does NOT affect clients such as the CLI or JDBC driver. ### Impact Authenticated users can bypass authorization checks by directly accessing internal APIs. This impacts Presto server installations with secure internal communication configured. This does not affect installations that have not configured secure internal communication, as these installations are inherently insecure. ### Patches This issue has been fixed starting with PrestoSQL version 337. ### Workarounds This issue can be mitigated by blocking network access to internal APIs on the coordinator and workers. ### References See the Presto documentation for [Secure Internal Communication](https://trino.io/docs/current/security/internal-communication.html). ### For more information If you have any questions or comments about this advisory: * Join the **#security** channel on [Slack](https://trino.io/slack.html). * Contact the security team at [security@trino.io](mailto:security@trino.io)

Metadata

Created: 2020-06-30T16:33:23Z
Modified: 2022-10-22T00:58:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/06/GHSA-f6pc-crhh-cp96/GHSA-f6pc-crhh-cp96.json
CWE IDs: ["CWE-285"]
Alternative ID: GHSA-f6pc-crhh-cp96
Finding: F039
Auto approve: 1