git: a991db5e17fa - main - security/vuxml: Record kafka vulnerability

From: Fernando Apesteguía <fernape_at_FreeBSD.org>
Date: Sun, 10 Dec 2023 17:09:11 UTC
The branch main has been updated by fernape:

URL: https://cgit.FreeBSD.org/ports/commit/?id=a991db5e17fa496ec31e0416b8dd8ee357dbee0e

commit a991db5e17fa496ec31e0416b8dd8ee357dbee0e
Author:     Fernando Apesteguía <fernape@FreeBSD.org>
AuthorDate: 2023-12-10 17:05:14 +0000
Commit:     Fernando Apesteguía <fernape@FreeBSD.org>
CommitDate: 2023-12-10 17:07:55 +0000

    security/vuxml: Record kafka vulnerability
    
    Authorization Bypass Through User-Controlled Key vulnerability in Apache
    ZooKeeper.
    
    Note that this only affects SASL Quorum Peer authentication which is
    not enabled by default.
    
     Base Score:    9.1 CRITICAL
     Vector:        CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
    
    PR:     275611
---
 security/vuxml/vuln/2023.xml | 42 ++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 790a48f245fd..4f32c6f80e04 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,45 @@
+  <vuln vid="2bc376c0-977e-11ee-b4bc-b42e991fc52e">
+    <topic>apache -- Apache ZooKeeper: Authorization bypass in SASL Quorum Peer Authentication</topic>
+    <affects>
+      <package>
+	<name>apache</name>
+	<range><lt>3.7.2</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>security@apache.org reports:</p>
+	<blockquote cite="http://www.openwall.com/lists/oss-security/2023/10/11/4">
+	  <p>Authorization Bypass Through User-Controlled Key vulnerability in
+	Apache ZooKeeper.  If SASL Quorum Peer authentication is enabled
+	in ZooKeeper (quorum.auth.enableSasl=true), the authorization is
+	done by verifying that the instance part in SASL authentication ID
+	is listed in zoo.cfg server list.  The instance part in SASL auth
+	ID is optional and if it&apos;s missing, like &apos;eve@EXAMPLE.COM&apos;,
+	the authorization check will be skipped.As a result an arbitrary
+	endpoint could join the cluster and begin propagating counterfeit
+	changes to the leader, essentially giving it complete read-write
+	access to the data tree.Quorum Peer authentication is not enabled
+	by default.
+	Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2,
+	which fixes the issue.
+	Alternately ensure the ensemble election/quorum communication is
+	protected by a firewall as this will mitigate the issue.
+	See the documentation for more details on correct cluster administration.
+	</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2023-44981</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2023-44981</url>
+    </references>
+    <dates>
+      <discovery>2023-10-11</discovery>
+      <entry>2023-12-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="bbda3d16-968e-11ee-b780-b42e991fc52e">
     <topic>strongswan -- buffer overflow</topic>
     <affects>