Apache

Zookeeper

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 24.09.2025 10:15:28
  • Last modified 02.10.2025 14:56:49

Improper permission check in ZooKeeper AdminServer lets authorized clients to run snapshot and restore command with insufficient permissions. This issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4. Users are recommended to upgrade to version ...

  • EPSS 0.31%
  • Published 07.11.2024 10:15:08
  • Last modified 21.11.2024 09:45:38

When using IPAuthenticationProvider in ZooKeeper Admin Server there is a possibility of Authentication Bypass by Spoofing -- this only impacts IP based authentication implemented in ZooKeeper Admin Server. Default configuration of client's IP address...

  • EPSS 0.03%
  • Published 15.03.2024 11:15:08
  • Last modified 03.07.2025 15:15:22

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access ...

  • EPSS 0.03%
  • Published 11.10.2023 12:15:11
  • Last modified 23.04.2025 17:16:39

Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authen...

  • EPSS 0.96%
  • Published 09.03.2021 19:15:12
  • Last modified 21.11.2024 05:47:57

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerabi...

  • EPSS 0.29%
  • Published 23.05.2019 14:29:07
  • Last modified 21.11.2024 04:16:28

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field a...

  • EPSS 0.92%
  • Published 21.05.2018 19:29:00
  • Last modified 21.11.2024 04:13:05

No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit cha...

  • EPSS 16.89%
  • Published 10.10.2017 01:30:22
  • Last modified 20.04.2025 01:37:25

Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3...

Exploit
  • EPSS 6.11%
  • Published 21.09.2016 14:25:12
  • Last modified 12.04.2025 10:46:40

Buffer overflow in the C cli shell in Apache Zookeeper before 3.4.9 and 3.5.x before 3.5.3, when using the "cmd:" batch mode syntax, allows attackers to have unspecified impact via a long command string.