Логотип exploitDog
bind:CVE-2024-23944
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-23944

Количество 7

Количество 7

ubuntu логотип

CVE-2024-23944

почти 2 года назад

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2024-23944

почти 2 года назад

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 6.6
EPSS: Низкий
nvd логотип

CVE-2024-23944

почти 2 года назад

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2024-23944

почти 2 года назад

Information disclosure in persistent watchers handling in Apache ZooKe ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-r978-9m6m-6gm6

почти 2 года назад

Apache ZooKeeper vulnerable to information disclosure in persistent watchers handling

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-06490

почти 2 года назад

Уязвимость централизованной службы для поддержки информации о конфигурации, именования, обеспечения распределенной синхронизации и предоставления групповых служб Apache ZooKeeper, связанная с раскрытием конфиденциальной информации неавторизованному лицу, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20240815-05

больше 1 года назад

Множественные уязвимости zookeeper

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 6.6
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn't do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
debian логотип
CVE-2024-23944

Information disclosure in persistent watchers handling in Apache ZooKe ...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-r978-9m6m-6gm6

Apache ZooKeeper vulnerable to information disclosure in persistent watchers handling

CVSS3: 5.3
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-06490

Уязвимость централизованной службы для поддержки информации о конфигурации, именования, обеспечения распределенной синхронизации и предоставления групповых служб Apache ZooKeeper, связанная с раскрытием конфиденциальной информации неавторизованному лицу, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 6.5
0%
Низкий
почти 2 года назад
redos логотип
ROS-20240815-05

Множественные уязвимости zookeeper

CVSS3: 8.1
больше 1 года назад

Уязвимостей на страницу