Learn about CVE-2021-45097 affecting KNIME Server before 4.12.6 and 4.13.x. Find mitigation steps, impact details, and how to prevent unauthorized access.
CVE-2021-45097 relates to a security issue in KNIME Server versions before 4.12.6 and 4.13.x before 4.13.4 when installed in unattended mode. The vulnerability allows local users to access the administrator's password due to inadequate file access controls.
Understanding CVE-2021-45097
What is CVE-2021-45097?
KNIME Server before specified versions improperly stores the administrator's password in a file without the necessary file access controls, enabling unauthorized local users to view its contents.
The Impact of CVE-2021-45097
The vulnerability's CVSS base score is 2.9, indicating a low severity issue with a localized attack vector and high attack complexity. While the integrity and availability impacts are assessed as none, there is a low confidentiality impact.
Technical Details of CVE-2021-45097
Vulnerability Description
The vulnerability in KNIME Server versions allows all local users to read the admin password due to inadequate file access controls.
Affected Systems and Versions
Exploitation Mechanism
The issue occurs when KNIME Server is set up in unattended mode, which inappropriately exposes the administrator's password file to all local users.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply security patches and updates provided by KNIME to address vulnerabilities promptly.