Bug 2324330 (CVE-2024-51504)
Summary: | CVE-2024-51504 org.apache.zookeeper: Apache ZooKeeper: Authentication bypass with IP-based authentication in Admin Server | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aprice, asoldano, ataylor, bbaranow, bmaxwell, brian.stansberry, caswilli, ccranfor, cdewolf, chazlett, chfoley, cmiranda, darran.lofthouse, dkreling, dosoudil, fjuma, fmariani, gmalinko, istudens, ivassile, iweiss, janstey, jcantril, jpechane, jpoth, jross, jsamir, jscholz, kaycoth, kholdawa, lgao, mosmerov, mpierce, msochure, msvehla, nwallace, pcongius, pdelbell, pjindal, pmackay, rkieley, rojacob, rstancel, rstepani, smaestri, swoodman, tcunning, tom.jenkinson, yfang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An authentication bypass vulnerability was found in Apache Zookeeper. The default configuration of the client's IP address detection in IPAuthenticationProvider, which uses HTTP request headers, is weak and allows an attacker to bypass authentication by spoofing the client's IP address in request headers. The default configuration honors the X-Forwarded-For HTTP header to read the client's IP address, which can be easily spoofed by an attacker pretending that the request came from a different IP address. Admin Server commands, such as snapshot and restore arbitrarily, can be executed on successful exploitation, potentially leading to information leakage or service availability issues.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2024-11-07 10:02:17 UTC
|