VYPR
High severityNVD Advisory· Published May 5, 2023· Updated Oct 15, 2024

Apache Ranger: code execution vulnerability in policy expressions

CVE-2022-45048

Description

Authenticated users with appropriate privileges can create policies having expressions that can exploit code execution vulnerability. This issue affects Apache Ranger: 2.3.0. Users are recommended to update to version 2.4.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Ranger 2.3.0 allows authenticated users with appropriate privileges to create policies with expressions that can trigger remote code execution.

Vulnerability

Overview

CVE-2022-45048 is a code execution vulnerability in Apache Ranger version 2.3.0. The root cause lies in the policy creation mechanism: authenticated users who have sufficient privileges can craft policies containing specially crafted expressions. These expressions, when evaluated, can lead to arbitrary code execution on the server [1][2].

Attack

Vector and Prerequisites

An attacker must first obtain valid credentials for an Apache Ranger instance and possess the necessary privileges to create or modify security policies. No other special network access is required beyond being able to reach the Ranger admin console or API. The vulnerability is triggered when the malicious policy expression is processed by the Ranger backend [1][2].

Impact

Successful exploitation allows the attacker to execute arbitrary code on the Ranger server. This could lead to full compromise of the Ranger instance, including access to sensitive data that Ranger manages (e.g., Hadoop cluster security metadata). The impact is high because Ranger often holds credentials and policies for multiple data services [2].

Mitigation

The Apache Software Foundation released Apache Ranger version 2.4.0, which addresses this vulnerability. Users running 2.3.0 are strongly advised to upgrade immediately. No workarounds have been publicly disclosed [2]. The issue was reported via the Apache security mailing list.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.ranger:rangerMaven
>= 2.3.0, < 2.4.02.4.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.