CVE-2021-25312

8.8 HIGH

📋 TL;DR

This vulnerability in HTCondor allows authenticated users to submit jobs as other users on the system due to a flaw in the IDTOKENS authentication method. It affects HTCondor installations using IDTOKENS authentication before version 8.9.11. This enables privilege escalation and unauthorized job execution.

💻 Affected Systems

Products:
  • HTCondor
Versions: All versions before 8.9.11
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using IDTOKENS authentication method. Other authentication methods are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute arbitrary code as any user on the HTCondor system, potentially gaining full control over the cluster and accessing sensitive data or resources.

🟠

Likely Case

Malicious users can submit jobs with elevated privileges, potentially accessing restricted data, consuming resources, or disrupting legitimate jobs.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to authorized users within the HTCondor environment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to HTCondor. The vulnerability is in the authentication mechanism itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.9.11 and later

Vendor Advisory: https://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2021-0001.html

Restart Required: Yes

Instructions:

1. Download HTCondor 8.9.11 or later from official sources. 2. Stop HTCondor services. 3. Install the updated version. 4. Restart HTCondor services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable IDTOKENS authentication

linux

Switch to alternative authentication methods like Kerberos, SSL, or password-based authentication

Edit HTCondor configuration to remove or comment out SEC_DEFAULT_AUTHENTICATION_METHODS = IDTOKENS
Set alternative authentication methods in condor_config.local

Restrict user permissions

linux

Implement strict access controls and job submission restrictions

Configure ALLOW_WRITE to restrict which users can submit jobs
Use condor_config.local to implement granular permissions

🧯 If You Can't Patch

  • Implement network segmentation to isolate HTCondor systems from sensitive networks
  • Enable detailed logging and monitoring for suspicious job submissions

🔍 How to Verify

Check if Vulnerable:

Check HTCondor version and authentication configuration. Run: condor_version and review SEC_DEFAULT_AUTHENTICATION_METHODS in configuration.

Check Version:

condor_version

Verify Fix Applied:

Verify version is 8.9.11 or later with: condor_version. Confirm IDTOKENS authentication is properly implemented in updated version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual job submissions from unexpected users
  • Authentication failures or anomalies in IDTOKENS
  • Jobs running with unexpected user privileges

Network Indicators:

  • Unusual job submission patterns
  • Authentication traffic anomalies

SIEM Query:

source="htcondor" AND (event="job_submit" AND user!=submitter) OR (auth_method="IDTOKENS" AND status="failure")

🔗 References

📤 Share & Export