CVE-2024-51504 (Medium) detected in zookeeper-3.9.2.jar - autoclosed #4892
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
triaged
Issues labeled as 'Triaged' have been reviewed and are deemed actionable.
CVE-2024-51504 - Medium Severity Vulnerability
Vulnerable Library - zookeeper-3.9.2.jar
ZooKeeper server
Library home page: https://www.apache.org/
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.zookeeper/zookeeper/3.9.2/b6a8d8e3a4cf932cad92e5894c93724c73076333/zookeeper-3.9.2.jar
Dependency Hierarchy:
Found in HEAD commit: 993771cbeb5b2e0927af4a50e415fe10c4f6c3b8
Found in base branch: main
Vulnerability Details
When using IPAuthenticationProvider in ZooKeeper Admin Server there is a possibility of Authentication Bypass by
Spoofing -- this only impacts IP based authentication implemented in ZooKeeper Admin Server. Default configuration of
client's IP address detection in IPAuthenticationProvider, which uses HTTP request headers, is weak and allows an
attacker to bypass authentication via spoofing client's IP address in request headers. Default configuration honors
X-Forwarded-For HTTP header to read client's IP address. X-Forwarded-For request header is mainly used by proxy servers
to identify the client and can be easily spoofed by an attacker pretending that the request comes from a different IP
address. Admin Server commands, such as snapshot and restore arbitrarily can be executed on successful exploitation
which could potentially lead to information leakage or service availability issues. Users are recommended to upgrade to
version 3.9.3, which fixes this issue.
Publish Date: 2024-11-07
URL: CVE-2024-51504
CVSS 3 Score Details (5.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2024/q4/60
Release Date: 2024-11-07
Fix Resolution: 3.9.3
The text was updated successfully, but these errors were encountered: