This is an automated email from the ASF dual-hosted git repository.
andor pushed a commit to branch website
in repository https://gitbox.apache.org/repos/asf/zookeeper.git
The following commit(s) were added to refs/heads/website by this push:
new 247b247c5 CVE-2023-44981
247b247c5 is described below
commit 247b247c571e5eff391636ab685dc8cc914305d6
Author: Andor Molnar <[email protected]>
AuthorDate: Wed Oct 11 14:01:44 2023 +0200
CVE-2023-44981
---
src/main/resources/markdown/security.md | 34 +++++++++++++++++++++++++++++++++
1 file changed, 34 insertions(+)
diff --git a/src/main/resources/markdown/security.md
b/src/main/resources/markdown/security.md
index 99bfeee0c..9bde188df 100644
--- a/src/main/resources/markdown/security.md
+++ b/src/main/resources/markdown/security.md
@@ -30,12 +30,46 @@ their <a href="https://www.apache.org/security/">Web
page</a> for more informati
## Vulnerability reports
+* [CVE-2023-44981: Authorization bypass in SASL Quorum Peer
Authentication](#CVE-2023-44981)
* [CVE-2019-0201: Information disclosure vulnerability in Apache
ZooKeeper](#CVE-2019-0201)
* [CVE-2018-8012: Apache ZooKeeper Quorum Peer mutual
authentication](#CVE-2018-8012)
* [CVE-2017-5637: DOS attack on wchp/wchc four letter words
(4lw)](#CVE-2017-5637)
* [CVE-2016-5017: Buffer overflow vulnerability in ZooKeeper C cli
shell](#CVE-2016-5017)
+<a name="CVE-2023-44981"></a>
+### CVE-2023-44981: Authorization bypass in SASL Quorum Peer Authentication
+
+Severity: critical
+
+Affected versions:
+
+- Apache ZooKeeper 3.9.0
+- Apache ZooKeeper 3.8.0 through 3.8.2
+- Apache ZooKeeper 3.7.0 through 3.7.1
+- Apache ZooKeeper before 3.7.0
+
+Description:
+
+Authorization Bypass Through User-Controlled Key vulnerability in Apache
ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper
(quorum.auth.enableSasl=true), the authorization is done by verifying that the
instance part in SASL authentication ID is listed in zoo.cfg server list. The
instance part in SASL auth ID is optional and if it's missing, like
'[email protected]', the authorization check will be skipped. As a result an
arbitrary endpoint could join the cluster and beg [...]
+
+Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes
the issue.
+
+Alternately ensure the ensemble election/quorum communication is protected by
a firewall as this will mitigate the issue.
+
+See the documentation for more details on correct cluster administration.
+
+Credit:
+
+Damien Diederen <[email protected]> (reporter)
+
+References:
+
+[https://zookeeper.apache.org/](https://zookeeper.apache.org/)
+
+[https://www.cve.org/CVERecord?id=CVE-2023-44981](https://www.cve.org/CVERecord?id=CVE-2023-44981)
+
+
<a name="CVE-2019-0201"></a>
### CVE-2019-0201: Information disclosure vulnerability in Apache ZooKeeper