First published: Thu Mar 14 2024(Updated: )
Apache ZooKeeper could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in persistent watchers handling. By attaching a persistent watcher to a parent, an attacker could exploit this vulnerability to obtain information of the full path of znodes, and use this information to launch further attacks against the affected system.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.zookeeper:zookeeper | >=3.6.0<=3.7.2 | |
maven/org.apache.zookeeper:zookeeper | >=3.9.0<=3.9.1 | 3.9.2 |
maven/org.apache.zookeeper:zookeeper | >=3.8.0<=3.8.3 | 3.8.4 |
IBM QRadar Security Information and Event Manager | <=7.5 - 7.5.0 UP9 IF03 | |
IBM Security QRadar Incident Forensics | <=7.5 - 7.5.0 UP9 IF03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-23944 is classified as medium due to its potential impact on sensitive information disclosure.
To fix CVE-2024-23944, upgrade Apache ZooKeeper to version 3.7.3, 3.8.4 or 3.9.2 or later releases.
Versions 3.6.0 to 3.7.2 and 3.9.0 to 3.9.1 of Apache ZooKeeper are affected by CVE-2024-23944.
No, CVE-2024-23944 requires a remote authenticated attacker to exploit the vulnerability.
An attacker exploiting CVE-2024-23944 can obtain the full path of znodes in the ZooKeeper data tree.