This is an automated email from the ASF dual-hosted git repository.

andor pushed a commit to branch website
in repository https://gitbox.apache.org/repos/asf/zookeeper.git


The following commit(s) were added to refs/heads/website by this push:
     new 97a42d6f3 CVE-2024-23944
97a42d6f3 is described below

commit 97a42d6f3dddf94d013343929e2c21ecdd02f275
Author: Andor Molnar <[email protected]>
AuthorDate: Thu Mar 14 11:05:11 2024 -0500

    CVE-2024-23944
---
 src/main/resources/markdown/security.md | 29 +++++++++++++++++++++++++++++
 1 file changed, 29 insertions(+)

diff --git a/src/main/resources/markdown/security.md 
b/src/main/resources/markdown/security.md
index 9bde188df..c94d5b41d 100644
--- a/src/main/resources/markdown/security.md
+++ b/src/main/resources/markdown/security.md
@@ -30,6 +30,7 @@ their <a href="https://www.apache.org/security/";>Web page</a> 
for more informati
 
 ## Vulnerability reports
 
+* [CVE-2024-23944: Information disclosure in persistent watcher 
handling](#CVE-2024-23944)
 * [CVE-2023-44981: Authorization bypass in SASL Quorum Peer 
Authentication](#CVE-2023-44981)
 * [CVE-2019-0201: Information disclosure vulnerability in Apache 
ZooKeeper](#CVE-2019-0201)
 * [CVE-2018-8012: Apache ZooKeeper Quorum Peer mutual 
authentication](#CVE-2018-8012)
@@ -37,6 +38,34 @@ their <a href="https://www.apache.org/security/";>Web 
page</a> for more informati
 * [CVE-2016-5017: Buffer overflow vulnerability in ZooKeeper C cli 
shell](#CVE-2016-5017)
 
 
+<a name="CVE-2024-23944"></a>
+### CVE-2024-23944: Information disclosure in persistent watcher handling
+
+Severity: critical
+
+Affected versions:
+
+- Apache ZooKeeper 3.9.0 through 3.9.1
+- Apache ZooKeeper 3.8.0 through 3.8.3
+- Apache ZooKeeper 3.6.0 through 3.7.2
+
+Description:
+
+Information disclosure in persistent watchers handling in Apache ZooKeeper due 
to missing ACL check. It allows an attacker to monitor child znodes by 
attaching a persistent watcher (addWatch command) to a parent which the 
attacker has already access to. ZooKeeper server doesn't do ACL check when the 
persistent watcher is triggered and as a consequence, the full path of znodes 
that a watch event gets triggered upon is exposed to the owner of the watcher. 
It's important to note that only t [...]
+
+Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.
+
+Credit:
+
+周吉安(寒泉) <[email protected]> (reporter)
+
+References:
+
+[https://zookeeper.apache.org/](https://zookeeper.apache.org/)
+[https://www.cve.org/CVERecord?id=CVE-2024-23944](https://www.cve.org/CVERecord?id=CVE-2024-23944)
+
+
+
 <a name="CVE-2023-44981"></a>
 ### CVE-2023-44981: Authorization bypass in SASL Quorum Peer Authentication
 

Reply via email to