Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-0201

Опубликовано: 20 мая 2019
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.

A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.

Меры по смягчению последствий

Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6zookeeperOut of support scope
Red Hat JBoss BRMS 6zookeeperOut of support scope
Red Hat JBoss Fuse Service Works 6zookeeperOut of support scope
Red Hat OpenShift Application RuntimeszookeeperNot affected
streams for Apache KafkazookeeperNot affected
Red Hat Fuse 6.3zookeeperFixedRHSA-2019:435219.12.2019
Red Hat Fuse 6.3zookeeperFixedRHSA-2019:435219.12.2019
Red Hat Fuse 7.5.0zookeeperFixedRHSA-2019:389214.11.2019
Red Hat JBoss Data Virtualization 6.4.8zookeeperFixedRHSA-2019:314017.10.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1715197zookeeper: Information disclosure in Apache ZooKeeper

EPSS

Процентиль: 47%
0.00237
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 6 лет назад

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.

CVSS3: 5.9
nvd
около 6 лет назад

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.

CVSS3: 5.9
debian
около 6 лет назад

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alph ...

CVSS3: 5.9
github
около 6 лет назад

Access control bypass in Apache ZooKeeper

CVSS3: 5.9
fstec
около 6 лет назад

Уязвимость реализации команды getACL() централизованной службы для поддержки информации о конфигурации, именования, обеспечения распределенной синхронизации и предоставления групповых служб Apache ZooKeeper, позволяющая нарушителю раскрыть некоторые значения хеш-функции

EPSS

Процентиль: 47%
0.00237
Низкий

7.5 High

CVSS3