CVE-2019-0201

Published: 23 May 2019

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.

Priority

Low

CVSS 3 base score: 5.9

Status

Package Release Status
zookeeper
Launchpad, Ubuntu, Debian
Upstream
Released (3.4.9-3+deb9u2)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(3.4.13-3)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.4.13-3)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 LTS (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Needed

Patches:
Upstream: https://gitbox.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=5ff19e3672987bdde2843a3f031e2bf0010e35f1