Bug 2243436 (CVE-2023-44981)
Summary: | CVE-2023-44981 zookeeper: Authorization Bypass in Apache ZooKeeper | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Nick Tait <ntait> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aileenc, anstephe, ataylor, avibelli, bgeorges, chazlett, chfoley, dhanak, dkreling, gmalinko, ibek, janstey, jolee, jrokos, jross, jschatte, jscholz, jstastny, kverlaen, lthon, mnovotny, pdelbell, peholase, pgallagh, pjindal, rguimara, rkieley, rruss, swoodman |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | zookeeper 3.9.1, zookeeper 3.8.3, zookeeper 3.7.2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Apache ZooKeeper. Authorization bypass through user-controlled key is available iff SASL Quorum Peer authentication is enabled in ZooKeeper via quorum.auth.enableSasl=true configuration. A malicious user could bypass the authentication controller by using a non-existing instance part in SASL authentication ID (which is optional), therefore, the server would skip this check and as a result, join the cluster and propagate information with complete read and write access.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2244893, 2244894 | ||
Bug Blocks: | 2243438 |
Description
Nick Tait
2023-10-11 23:51:00 UTC
Created zookeeper tracking bugs for this issue: Affects: fedora-all [bug 2244893] This issue has been addressed in the following products: Red Hat AMQ Streams 2.6.0 Via RHSA-2023:7678 https://access.redhat.com/errata/RHSA-2023:7678 This issue has been addressed in the following products: Red Hat AMQ Broker 7.11.6 Via RHSA-2024:0705 https://access.redhat.com/errata/RHSA-2024:0705 This issue has been addressed in the following products: AMQ Broker 7.10.6 Via RHSA-2024:0903 https://access.redhat.com/errata/RHSA-2024:0903 This issue has been addressed in the following products: Red Hat JBoss AMQ Via RHSA-2024:2945 https://access.redhat.com/errata/RHSA-2024:2945 This issue has been addressed in the following products: Red Hat AMQ Streams 2.5.2 Via RHSA-2024:6536 https://access.redhat.com/errata/RHSA-2024:6536 |