Lucene search

K
ibmIBM890D26C1A7349CE38D9DBC95CF46F2E9DB9DCD816F51C610D2089508498FEC3E
HistoryJul 12, 2024 - 5:04 a.m.

Security Bulletin: Information disclosure in persistent watchers handling

2024-07-1205:04:33
www.ibm.com
6
apache zookeeper
persistent watchers
information disclosure
acl check
upgrade
powervc
version 3.9.2
version 3.8.4
cve-2024-23944
cvss score
sensitive information
powervc 2.1.1
powervc 2.1.1.1
powervc 2.2.0

AI Score

5.7

Confidence

High

Summary

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. It allows an attacker to monitor child znodes by attaching a persistent watcher (addWatch command) to a parent which the attacker has already access to. ZooKeeper server doesn’t do ACL check when the persistent watcher is triggered and as a consequence, the full path of znodes that a watch event gets triggered upon is exposed to the owner of the watcher. It’s important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue.

Vulnerability Details

CVEID:CVE-2024-23944
**DESCRIPTION:**Apache ZooKeeper could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in persistent watchers handling. By attaching a persistent watcher to a parent, an attacker could exploit this vulnerability to obtain information of the full path of znodes, and use this information to launch further attacks against the affected system.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/285579 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
PowerVC All

Remediation/Fixes

PowerVC Version Fix
2.1.1 https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/PowerVC&release=2.1.1&platform=All&function=fixId&fixids=2.1.1-PowerVC-RHEL-SLES-NOARCH-APAR-IT45537&includeRequisites=1&includeSupersedes=0&downloadMethod=http&login=true
2.1.1.1 https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/PowerVC&release=2.1.1.1&platform=All&function=fixId&fixids=2.1.1.1-PowerVC-RHEL-SLES-NOARCH-APAR-IT45572&includeRequisites=1&includeSupersedes=0&downloadMethod=http
2.2.0 https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=ibm%7EOther%20software&product=ibm/Other+software/PowerVC&release=2.2.0&platform=All&function=fixId&fixids=2.2.0-PowerVC-RHEL-SLES-NOARCH-APAR-IT45538&includeRequisites=1&includeSupersedes=0&downloadMethod=http

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmpowervcMatchanystandard
VendorProductVersionCPE
ibmpowervcanycpe:2.3:a:ibm:powervc:any:*:*:*:standard:*:*:*

AI Score

5.7

Confidence

High

Related for 890D26C1A7349CE38D9DBC95CF46F2E9DB9DCD816F51C610D2089508498FEC3E