This is an automated email from the ASF dual-hosted git repository.
ddiederen pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/zookeeper.git
The following commit(s) were added to refs/heads/asf-site by this push:
new 93bda6f30 Website update for CVE-2025-58457
93bda6f30 is described below
commit 93bda6f301e646039192d5542c01f99a6e2b2a06
Author: Damien Diederen <[email protected]>
AuthorDate: Wed Sep 24 11:30:45 2025 +0200
Website update for CVE-2025-58457
---
content/security.html | 17 +++++++++++++++++
1 file changed, 17 insertions(+)
diff --git a/content/security.html b/content/security.html
index 17812e77c..39436fd3c 100644
--- a/content/security.html
+++ b/content/security.html
@@ -95,6 +95,7 @@ <h1>ZooKeeper Security</h1>
<p>The ASF Security team maintains a page with a description of how
vulnerabilities are handled, check their <a
href="https://www.apache.org/security/">Web page</a> for more information.</p>
<h2>Vulnerability reports</h2>
<ul>
+<li><a href="#CVE-2025-58457">CVE-2025-58457: Insufficient Permission Check in
AdminServer Snapshot/Restore Commands</a></li>
<li><a href="#CVE-2024-51504">CVE-2024-51504: Authentication bypass with
IP-based authentication in Admin Server</a></li>
<li><a href="#CVE-2024-23944">CVE-2024-23944: Information disclosure in
persistent watcher handling</a></li>
<li><a href="#CVE-2023-44981">CVE-2023-44981: Authorization bypass in SASL
Quorum Peer Authentication</a></li>
@@ -103,6 +104,22 @@ <h2>Vulnerability reports</h2>
<li><a href="#CVE-2017-5637">CVE-2017-5637: DOS attack on wchp/wchc four
letter words (4lw)</a></li>
<li><a href="#CVE-2016-5017">CVE-2016-5017: Buffer overflow vulnerability in
ZooKeeper C cli shell</a></li>
</ul>
+<p><a name="CVE-2025-58457"></a></p>
+<h3>CVE-2025-58457: Insufficient Permission Check in AdminServer
Snapshot/Restore Commands</h3>
+<p>Severity: moderate</p>
+<p>Affected versions:</p>
+<ul>
+<li>Apache ZooKeeper (<code>org.apache.zookeeper:zookeeper</code>) 3.9.0
before 3.9.4</li>
+</ul>
+<p>Description:</p>
+<p>Improper permission check in ZooKeeper AdminServer lets authorized clients
to run <code>snapshot</code> and <code>restore</code> command with insufficient
permissions.</p>
+<p>This issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4.</p>
+<p>Users are recommended to upgrade to version 3.9.4, which fixes the
issue.</p>
+<p>The issue can be mitigated by disabling both commands (via
<code>admin.snapshot.enabled</code> and <code>admin.restore.enabled</code>),
disabling the whole AdminServer interface (via
<code>admin.enableServer</code>), or ensuring that the root ACL does not
provide open permissions. (Note that ZooKeeper ACLs are not recursive, so this
does not impact operations on child nodes besides notifications from recursive
watches.)</p>
+<p>Credit:</p>
+<p>Damien Diederen <a
href="mailto:ddiederen@apache.org">ddiederen@apache.org</a>
(reporter)</p>
+<p>References:</p>
+<p><a href="https://zookeeper.apache.org/">https://zookeeper.apache.org/</a>
<a
href="https://www.cve.org/CVERecord?id=CVE-2025-58457">https://www.cve.org/CVERecord?id=CVE-2025-58457</a></p>
<p><a name="CVE-2024-51504"></a></p>
<h3>CVE-2024-51504: Authentication bypass with IP-based authentication in
Admin Server</h3>
<p>Severity: important</p>