This is an automated email from the ASF dual-hosted git repository.

andor pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/zookeeper.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 455b4c968 CVE-2023-44981
455b4c968 is described below

commit 455b4c968446cacb14d1ee829627af5739c42af6
Author: Andor Molnar <[email protected]>
AuthorDate: Wed Oct 11 14:03:59 2023 +0200

    CVE-2023-44981
---
 content/security.html | 23 ++++++++++++++++++++++-
 1 file changed, 22 insertions(+), 1 deletion(-)

diff --git a/content/security.html b/content/security.html
index 33571b736..ad81f848e 100644
--- a/content/security.html
+++ b/content/security.html
@@ -96,11 +96,32 @@ target="_top">[email protected]</a>. In the 
message, try to provide
 <p>The ASF Security team maintains a page with a description of how 
vulnerabilities are handled, check their <a 
href="https://www.apache.org/security/";>Web page</a> for more information.</p>
 <h2>Vulnerability reports</h2>
 <ul>
+<li><a href="#CVE-2023-44981">CVE-2023-44981: Authorization bypass in SASL 
Quorum Peer Authentication</a></li>
 <li><a href="#CVE-2019-0201">CVE-2019-0201: Information disclosure 
vulnerability in Apache ZooKeeper</a></li>
 <li><a href="#CVE-2018-8012">CVE-2018-8012: Apache ZooKeeper Quorum Peer 
mutual authentication</a></li>
 <li><a href="#CVE-2017-5637">CVE-2017-5637: DOS attack on wchp/wchc four 
letter words (4lw)</a></li>
 <li><a href="#CVE-2016-5017">CVE-2016-5017: Buffer overflow vulnerability in 
ZooKeeper C cli shell</a></li>
 </ul>
+<p><a name="CVE-2023-44981"></a></p>
+<h3>CVE-2023-44981: Authorization bypass in SASL Quorum Peer 
Authentication</h3>
+<p>Severity: critical</p>
+<p>Affected versions:</p>
+<ul>
+<li>Apache ZooKeeper 3.9.0</li>
+<li>Apache ZooKeeper 3.8.0 through 3.8.2</li>
+<li>Apache ZooKeeper 3.7.0 through 3.7.1</li>
+<li>Apache ZooKeeper before 3.7.0</li>
+</ul>
+<p>Description:</p>
+<p>Authorization Bypass Through User-Controlled Key vulnerability in Apache 
ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper 
(quorum.auth.enableSasl=true), the authorization is done by verifying that the 
instance part in SASL authentication ID is listed in zoo.cfg server list. The 
instance part in SASL auth ID is optional and if it's missing, like 
'[email protected]', the authorization check will be skipped. As a result an 
arbitrary endpoint could join the cluster and  [...]
+<p>Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which 
fixes the issue.</p>
+<p>Alternately ensure the ensemble election/quorum communication is protected 
by a firewall as this will mitigate the issue.</p>
+<p>See the documentation for more details on correct cluster 
administration.</p>
+<p>Credit:</p>
+<p>Damien Diederen <a 
href="&#109;a&#105;&#x6c;&#x74;&#x6f;&#x3a;&#100;&#x64;&#x69;e&#100;&#x65;&#114;e&#110;&#64;&#97;p&#97;c&#x68;&#101;&#x2e;&#x6f;&#114;&#103;">d&#x64;&#x69;e&#100;&#x65;&#x72;&#101;&#110;&#64;&#97;&#112;&#x61;&#x63;&#104;&#101;&#46;&#111;&#x72;&#103;</a>
 (reporter)</p>
+<p>References:</p>
+<p><a 
href="https://zookeeper.apache.org/";>https://zookeeper.apache.org/</a></p>
+<p><a 
href="https://www.cve.org/CVERecord?id=CVE-2023-44981";>https://www.cve.org/CVERecord?id=CVE-2023-44981</a></p>
 <p><a name="CVE-2019-0201"></a></p>
 <h3>CVE-2019-0201: Information disclosure vulnerability in Apache 
ZooKeeper</h3>
 <p>Severity: Critical</p>
@@ -108,7 +129,7 @@ target="_top">[email protected]</a>. In the 
message, try to provide
 <p>Versions Affected: ZooKeeper prior to 3.4.14 ZooKeeper 3.5.0-alpha through 
3.5.4-beta. The unsupported ZooKeeper 1.x through 3.3.x versions may be also 
affected.</p>
 <p>Description: ZooKeeper’s getACL() command doesn’t check any permission when 
retrieves the ACLs of the requested node and returns all information contained 
in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads 
the Id field with the hash value that is used for user authentication. As a 
consequence, if Digest Authentication is in use, the unsalted hash value will 
be disclosed by getACL() request for unauthenticated or unprivileged users.</p>
 <p>Mitigation: Use an authentication method other than Digest (e.g. Kerberos) 
or upgrade to 3.4.14 or later (3.5.5 or later if on the 3.5 branch).</p>
-<p>Credit: This issue was identified by Harrison Neal <a 
href="&#109;a&#105;&#x6c;&#x74;&#x6f;&#x3a;&#104;&#x61;&#x72;r&#105;&#x73;&#111;n&#64;&#112;&#97;t&#99;h&#x61;&#100;&#x76;&#x69;&#115;&#111;r&#x2e;&#x63;o&#109;">&#x68;&#x61;&#114;&#114;&#105;&#115;&#111;&#x6e;&#x40;&#112;&#97;&#116;&#99;&#x68;&#97;&#100;&#118;&#x69;&#115;&#111;&#x72;&#46;&#x63;&#x6f;&#x6d;</a>
 PatchAdvisor, Inc.</p>
+<p>Credit: This issue was identified by Harrison Neal <a 
href="&#109;&#97;&#x69;&#108;&#116;&#x6f;&#58;&#x68;&#x61;&#x72;&#x72;&#105;&#x73;&#111;&#110;@&#112;&#x61;&#x74;c&#x68;&#97;&#100;&#118;&#x69;&#115;o&#x72;&#46;&#99;&#x6f;&#109;">&#x68;&#97;&#114;&#114;&#x69;&#x73;&#x6f;&#110;&#64;&#112;&#x61;&#x74;&#99;&#104;a&#x64;v&#105;&#115;o&#x72;&#x2e;&#x63;&#111;&#109;</a>
 PatchAdvisor, Inc.</p>
 <p>References: https://issues.apache.org/jira/browse/ZOOKEEPER-1392</p>
 <p><a name="CVE-2018-8012"></a></p>
 <h3>CVE-2018-8012: Apache ZooKeeper Quorum Peer mutual authentication</h3>

Reply via email to