CVE-2019-0201 (CNNVD-201905-954)
中文标题:
Apache Zookeeper 授权问题漏洞
英文标题:
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s g...
漏洞描述
中文描述:
Apache Zookeeper是美国阿帕奇(Apache)软件基金会的一个软件项目,它能够为大型分布式计算提供开源的分布式配置服务、同步服务和命名注册等功能。 Apache ZooKeeper 1.0.0版本至3.4.13版本和3.5.0-alpha版本至3.5.4-beta版本中存在授权问题漏洞。该漏洞源于网络系统或产品中缺少身份验证措施或身份验证强度不足。
英文描述:
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Apache Software Foundation | Apache ZooKeeper | 1.0.0 to 3.4.13 | - | - |
cpe:2.3:a:apache_software_foundation:apache_zookeeper:1.0.0_to_3.4.13:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache ZooKeeper | 3.5.0-alpha to 3.5.4-beta | - | - |
cpe:2.3:a:apache_software_foundation:apache_zookeeper:3.5.0-alpha_to_3.5.4-beta:*:*:*:*:*:*:*
|
| apache | activemq | 5.15.9 | - | - |
cpe:2.3:a:apache:activemq:5.15.9:*:*:*:*:*:*:*
|
| apache | drill | 1.16.0 | - | - |
cpe:2.3:a:apache:drill:1.16.0:*:*:*:*:*:*:*
|
| apache | zookeeper | * | - | - |
cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*
|
| apache | zookeeper | 3.5.0 | - | - |
cpe:2.3:a:apache:zookeeper:3.5.0:-:*:*:*:*:*:*
|
| apache | zookeeper | 3.5.1 | - | - |
cpe:2.3:a:apache:zookeeper:3.5.1:-:*:*:*:*:*:*
|
| apache | zookeeper | 3.5.2 | - | - |
cpe:2.3:a:apache:zookeeper:3.5.2:-:*:*:*:*:*:*
|
| apache | zookeeper | 3.5.3 | - | - |
cpe:2.3:a:apache:zookeeper:3.5.3:-:*:*:*:*:*:*
|
| apache | zookeeper | 3.5.4 | - | - |
cpe:2.3:a:apache:zookeeper:3.5.4:beta:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| redhat | fuse | 1.0.0 | - | - |
cpe:2.3:a:redhat:fuse:1.0.0:*:*:*:*:*:*:*
|
| oracle | goldengate_stream_analytics | * | - | - |
cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*
|
| oracle | siebel_core_-_server_framework | * | - | - |
cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:*
|
| oracle | timesten_in-memory_database | * | - | - |
cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*
|
| netapp | hci_bootstrap_os | - | - | - |
cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*
|
| netapp | element_software | - | - | - |
cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-0201 |
2025-11-11 15:19:56 | 2025-11-11 07:35:24 |
| NVD | nvd_CVE-2019-0201 |
2025-11-11 14:56:22 | 2025-11-11 07:43:58 |
| CNNVD | cnnvd_CNNVD-201905-954 |
2025-11-11 15:10:12 | 2025-11-11 07:54:34 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201905-954
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.9
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 2 -> 18
- data_sources: ['cve'] -> ['cve', 'nvd']