<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
[CVE-2019-0201] Information disclosure vulnerability in Apache ZooKeeper
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Andor Molnar <andor () apache org>
Date: Mon, 20 May 2019 19:15:24 +0200
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
CVE-2019-0201: Information disclosure vulnerability in Apache ZooKeeper
Severity: Critical
Vendor: The Apache Software Foundation
Versions Affected: ZooKeeper prior to 3.4.14, ZooKeeper 3.5.0-alpha through 3.5.4-beta. The unsupported ZooKeeper 1.x
through 3.3.x versions may be also affected.
Description: ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node
and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads
the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in
use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.
Mitigation: Use an authentication method other than Digest (e.g. Kerberos) or upgrade to 3.4.14 or later (3.5.5 or
later if on the 3.5 branch).
Credit: This issue was identified by Harrison Neal <harrison () patchadvisor com> PatchAdvisor, Inc.
References: https://issues.apache.org/jira/browse/ZOOKEEPER-1392
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
[CVE-2019-0201] Information disclosure vulnerability in Apache ZooKeeper Andor Molnar (May 20)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->