First published: Thu Mar 14 2024(Updated: )
Apache ZooKeeper could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in persistent watchers handling. By attaching a persistent watcher to a parent, an attacker could exploit this vulnerability to obtain information of the full path of znodes, and use this information to launch further attacks against the affected system.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.zookeeper:zookeeper | >=3.6.0<=3.7.2 | |
maven/org.apache.zookeeper:zookeeper | >=3.9.0<=3.9.1 | 3.9.2 |
maven/org.apache.zookeeper:zookeeper | >=3.8.0<=3.8.3 | 3.8.4 |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.1 | |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.