Apache

Zookeeper

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 07.03.2026 08:51:17
  • Zuletzt bearbeitet 10.03.2026 18:18:27

Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at ...

  • EPSS 0.03%
  • Veröffentlicht 07.03.2026 08:50:32
  • Zuletzt bearbeitet 10.03.2026 18:18:17

Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PT...

  • EPSS 0.1%
  • Veröffentlicht 24.09.2025 10:15:28
  • Zuletzt bearbeitet 04.11.2025 22:16:34

Improper permission check in ZooKeeper AdminServer lets authorized clients to run snapshot and restore command with insufficient permissions. This issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4. Users are recommended to upgrade to version ...

  • EPSS 0.06%
  • Veröffentlicht 07.11.2024 10:15:08
  • Zuletzt bearbeitet 21.11.2024 09:45:38

When using IPAuthenticationProvider in ZooKeeper Admin Server there is a possibility of Authentication Bypass by Spoofing -- this only impacts IP based authentication implemented in ZooKeeper Admin Server. Default configuration of client's IP address...

  • EPSS 0.02%
  • Veröffentlicht 15.03.2024 11:15:08
  • Zuletzt bearbeitet 03.07.2025 15:15:22

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access ...

  • EPSS 0.03%
  • Veröffentlicht 11.10.2023 12:15:11
  • Zuletzt bearbeitet 23.04.2025 17:16:39

Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authen...

  • EPSS 0.39%
  • Veröffentlicht 09.03.2021 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:47:57

Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerabi...

  • EPSS 0.21%
  • Veröffentlicht 23.05.2019 14:29:07
  • Zuletzt bearbeitet 21.11.2024 04:16:28

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field a...

  • EPSS 1.37%
  • Veröffentlicht 21.05.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:05

No authentication/authorization is enforced when a server attempts to join a quorum in Apache ZooKeeper before 3.4.10, and 3.5.0-alpha through 3.5.3-beta. As a result an arbitrary end point could join the cluster and begin propagating counterfeit cha...

  • EPSS 17.45%
  • Veröffentlicht 10.10.2017 01:30:22
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3...