Website updated.

On Wed, 2024-11-06 at 15:30 +0000, Andor Molnar wrote:
> Severity: important
> 
> Affected versions:
> 
> - Apache ZooKeeper 3.9.0 before 3.9.3
> 
> Description:
> 
> When using IPAuthenticationProvider in ZooKeeper Admin Server there
> is a possibility of Authentication Bypass by Spoofing -- this only
> impacts IP based authentication implemented in ZooKeeper Admin
> Server. Default configuration of client's IP address detection
> in IPAuthenticationProvider, which uses HTTP request headers, is
> weak and allows an attacker to bypass authentication via spoofing
> client's IP address in request headers. Default configuration honors
> X-Forwarded-For HTTP header to read client's IP address. X-Forwarded-
> For request header is mainly used by proxy servers to identify the
> client and can be easily spoofed by an attacker pretending that the
> request comes from a different IP address. Admin Server commands,
> such as snapshot and restore arbitrarily can be executed on
> successful exploitation which could potentially lead to information
> leakage or service availability issues. Users are recommended to
> upgrade to version 3.9.3, which fixes this issue.
> 
> Credit:
> 
> 4ra1n (reporter)
> Y4tacker (reporter)
> 
> References:
> 
> https://zookeeper.apache.org/
> https://www.cve.org/CVERecord?id=CVE-2024-51504
> 

Reply via email to