==================================================================== CERT-Renater Note d'Information No. 2019/VULN167 _____________________________________________________________________ DATE : 31/05/2019 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Apache ZooKeeper versions prior to 3.4.14, 3.5.5. ===================================================================== http://mail-archives.apache.org/mod_mbox/zookeeper-user/201905.mbox/%3cE3E37613-973F-4AFA-A28D-DB496F3A40C0@apache.org%3e _____________________________________________________________________ CVE-2019-0201: Information disclosure vulnerability in Apache ZooKeeper Severity: Critical Vendor: The Apache Software Foundation Versions Affected: ZooKeeper prior to 3.4.14, ZooKeeper 3.5.0-alpha through 3.5.4-beta. The unsupported ZooKeeper 1.x through 3.3.x versions may be also affected. Description: ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users. Mitigation: Use an authentication method other than Digest (e.g. Kerberos) or upgrade to 3.4.14 or later (3.5.5 or later if on the 3.5 branch). Credit: This issue was identified by Harrison Neal PatchAdvisor, Inc. References: https://issues.apache.org/jira/browse/ZOOKEEPER-1392 ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================