CVE-2019-0201
Published: 23 May 2019
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.
Priority
Status
Package | Release | Status |
---|---|---|
zookeeper Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(3.4.13-3)
|
cosmic |
Ignored
(end of life)
|
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(3.4.13-3)
|
|
groovy |
Not vulnerable
(3.4.13-3)
|
|
hirsute |
Not vulnerable
(3.4.13-3)
|
|
impish |
Not vulnerable
(3.4.13-3)
|
|
jammy |
Not vulnerable
(3.4.13-3)
|
|
kinetic |
Not vulnerable
(3.4.13-3)
|
|
lunar |
Not vulnerable
(3.4.13-3)
|
|
mantic |
Not vulnerable
(3.4.13-3)
|
|
trusty |
Released
(3.4.5+dfsg-1ubuntu0.1~esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(3.4.9-3+deb9u2)
|
|
xenial |
Released
(3.4.8-1ubuntu0.1~esm2)
Available with Ubuntu Pro |
|
Patches: upstream: https://gitbox.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=5ff19e3672987bdde2843a3f031e2bf0010e35f1 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |