Логотип exploitDog
bind:"CVE-2024-23944"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-23944"

Количество 7

Количество 7

ubuntu логотип

CVE-2024-23944

больше 1 года назад

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2024-23944

больше 1 года назад

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 6.6
EPSS: Низкий
nvd логотип

CVE-2024-23944

больше 1 года назад

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2024-23944

больше 1 года назад

Information disclosure in persistent watchers handling in Apache ZooKe ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-r978-9m6m-6gm6

больше 1 года назад

Apache ZooKeeper vulnerable to information disclosure in persistent watchers handling

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-06490

больше 1 года назад

Уязвимость централизованной службы для поддержки информации о конфигурации, именования, обеспечения распределенной синхронизации и предоставления групповых служб Apache ZooKeeper, связанная с раскрытием конфиденциальной информации неавторизованному лицу, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20240815-05

11 месяцев назад

Множественные уязвимости zookeeper

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKe ...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-r978-9m6m-6gm6

Apache ZooKeeper vulnerable to information disclosure in persistent watchers handling

CVSS3: 5.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-06490

Уязвимость централизованной службы для поддержки информации о конфигурации, именования, обеспечения распределенной синхронизации и предоставления групповых служб Apache ZooKeeper, связанная с раскрытием конфиденциальной информации неавторизованному лицу, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 6.5
0%
Низкий
больше 1 года назад
redos логотип
ROS-20240815-05

Множественные уязвимости zookeeper

CVSS3: 8.1
11 месяцев назад

Уязвимостей на страницу