The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 uses authentication directories even when they have weak permissions, which allows remote attackers to impersonate users by renaming a users authentication directory.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Condor | Condor_project | 7.6.0 (including) | 7.6.0 (including) |
Condor | Condor_project | 7.6.1 (including) | 7.6.1 (including) |
Condor | Condor_project | 7.6.2 (including) | 7.6.2 (including) |
Condor | Condor_project | 7.6.3 (including) | 7.6.3 (including) |
Condor | Condor_project | 7.6.4 (including) | 7.6.4 (including) |
Condor | Condor_project | 7.6.5 (including) | 7.6.5 (including) |
Condor | Condor_project | 7.6.6 (including) | 7.6.6 (including) |
Condor | Condor_project | 7.6.7 (including) | 7.6.7 (including) |
Condor | Condor_project | 7.6.8 (including) | 7.6.8 (including) |
Condor | Condor_project | 7.6.9 (including) | 7.6.9 (including) |
Condor | Condor_project | 7.8.0 (including) | 7.8.0 (including) |
Condor | Condor_project | 7.8.1 (including) | 7.8.1 (including) |
Condor | Condor_project | 7.8.2 (including) | 7.8.2 (including) |
Condor | Condor_project | 7.8.3 (including) | 7.8.3 (including) |