Bug 2243436 (CVE-2023-44981)
| Summary: | CVE-2023-44981 zookeeper: Authorization Bypass in Apache ZooKeeper | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Nick Tait <ntait> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | aileenc, anstephe, ataylor, avibelli, bgeorges, chazlett, chfoley, dhanak, dkreling, gmalinko, ibek, janstey, jolee, jrokos, jschatte, jstastny, kverlaen, lthon, mnovotny, pdelbell, peholase, pgallagh, pjindal, rguimara, rkieley, rruss, swoodman |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | zookeeper 3.9.1, zookeeper 3.8.3, zookeeper 3.7.2 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in Apache ZooKeeper. Authorization bypass through user-controlled key is available iff SASL Quorum Peer authentication is enabled in ZooKeeper via quorum.auth.enableSasl=true configuration. A malicious user could bypass the authentication controller by using a non-existing instance part in SASL authentication ID (which is optional), therefore, the server would skip this check and as a result, join the cluster and propagate information with complete read and write access.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2244893, 2244894 | ||
| Bug Blocks: | 2243438 | ||
|
Description
Nick Tait
2023-10-11 23:51:00 UTC
Created zookeeper tracking bugs for this issue: Affects: fedora-all [bug 2244893] This issue has been addressed in the following products: Red Hat AMQ Streams 2.6.0 Via RHSA-2023:7678 https://access.redhat.com/errata/RHSA-2023:7678 This issue has been addressed in the following products: Red Hat AMQ Broker 7.11.6 Via RHSA-2024:0705 https://access.redhat.com/errata/RHSA-2024:0705 This issue has been addressed in the following products: AMQ Broker 7.10.6 Via RHSA-2024:0903 https://access.redhat.com/errata/RHSA-2024:0903 This issue has been addressed in the following products: Red Hat JBoss AMQ Via RHSA-2024:2945 https://access.redhat.com/errata/RHSA-2024:2945 This issue has been addressed in the following products: Red Hat AMQ Streams 2.5.2 Via RHSA-2024:6536 https://access.redhat.com/errata/RHSA-2024:6536 |