Rapid7 Vulnerability & Exploit Database

Hadoop YARN ResourceManager Unauthenticated Command Execution

Back to Search

Hadoop YARN ResourceManager Unauthenticated Command Execution

Disclosed
10/19/2016
Created
07/25/2018

Description

This module uses Hadoop's standard ResourceManager REST API to execute arbitrary commands on an unsecured Hadoop server. Hadoop administrators should enable Kerberos authentication for these endpoints by changing the 'hadoop.security.authentication' setting in 'core-site.xml' from 'simple' (the default) to 'kerberos' before exposing the node to the network.

Author(s)

  • cbmixx
  • Green-m <greenm.xxoo@gmail.com>

Platform

Linux

Architectures

x86, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/hadoop_unauth_exec
msf exploit(hadoop_unauth_exec) > show targets
    ...targets...
msf exploit(hadoop_unauth_exec) > set TARGET < target-id >
msf exploit(hadoop_unauth_exec) > show options
    ...show and set options...
msf exploit(hadoop_unauth_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;