Thanks, Andor.

Do you have the PR link for the fix in 3.9.2 and 3.8.4? There is a
JIRA ticket in the release notes of 3.9.2 and 3.8.4, but the status is
still OPEN and there is no PR link there.

https://issues.apache.org/jira/browse/ZOOKEEPER-4799

We are in 3.7.2 and may need to patch it ourselves.

Best,

Li



On Thu, Mar 14, 2024 at 8:52 AM Andor Molnar <an...@apache.org> wrote:

> Severity: critical
>
> Affected versions:
>
> - Apache ZooKeeper 3.9.0 through 3.9.1
> - Apache ZooKeeper 3.8.0 through 3.8.3
> - Apache ZooKeeper 3.6.0 through 3.7.2
>
> Description:
>
> Information disclosure in persistent watchers handling in Apache ZooKeeper
> due to missing ACL check. It allows an attacker to monitor child znodes by
> attaching a persistent watcher (addWatch command) to a parent which the
> attacker has already access to. ZooKeeper server doesn't do ACL check when
> the persistent watcher is triggered and as a consequence, the full path of
> znodes that a watch event gets triggered upon is exposed to the owner of
> the watcher. It's important to note that only the path is exposed by this
> vulnerability, not the data of znode, but since znode path can contain
> sensitive information like user name or login ID, this issue is potentially
> critical.
>
> Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the
> issue.
>
> Credit:
>
> 周吉安(寒泉) <zhoujian....@alibaba-inc.com> (reporter)
>
> References:
>
> https://zookeeper.apache.org/
> https://www.cve.org/CVERecord?id=CVE-2024-23944
>
>

Reply via email to