git: a991db5e17fa - main - security/vuxml: Record kafka vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 10 Dec 2023 17:09:11 UTC
The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=a991db5e17fa496ec31e0416b8dd8ee357dbee0e commit a991db5e17fa496ec31e0416b8dd8ee357dbee0e Author: Fernando Apesteguía <fernape@FreeBSD.org> AuthorDate: 2023-12-10 17:05:14 +0000 Commit: Fernando Apesteguía <fernape@FreeBSD.org> CommitDate: 2023-12-10 17:07:55 +0000 security/vuxml: Record kafka vulnerability Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. Note that this only affects SASL Quorum Peer authentication which is not enabled by default. Base Score: 9.1 CRITICAL Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N PR: 275611 --- security/vuxml/vuln/2023.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 790a48f245fd..4f32c6f80e04 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,45 @@ + <vuln vid="2bc376c0-977e-11ee-b4bc-b42e991fc52e"> + <topic>apache -- Apache ZooKeeper: Authorization bypass in SASL Quorum Peer Authentication</topic> + <affects> + <package> + <name>apache</name> + <range><lt>3.7.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>security@apache.org reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2023/10/11/4"> + <p>Authorization Bypass Through User-Controlled Key vulnerability in + Apache ZooKeeper. If SASL Quorum Peer authentication is enabled + in ZooKeeper (quorum.auth.enableSasl=true), the authorization is + done by verifying that the instance part in SASL authentication ID + is listed in zoo.cfg server list. The instance part in SASL auth + ID is optional and if it's missing, like 'eve@EXAMPLE.COM', + the authorization check will be skipped.As a result an arbitrary + endpoint could join the cluster and begin propagating counterfeit + changes to the leader, essentially giving it complete read-write + access to the data tree.Quorum Peer authentication is not enabled + by default. + Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, + which fixes the issue. + Alternately ensure the ensemble election/quorum communication is + protected by a firewall as this will mitigate the issue. + See the documentation for more details on correct cluster administration. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-44981</cvename> + <url>https://nvd.nist.gov/vuln/detail/CVE-2023-44981</url> + </references> + <dates> + <discovery>2023-10-11</discovery> + <entry>2023-12-10</entry> + </dates> + </vuln> + <vuln vid="bbda3d16-968e-11ee-b780-b42e991fc52e"> <topic>strongswan -- buffer overflow</topic> <affects>