This is an automated email from the ASF dual-hosted git repository.

ddiederen pushed a commit to branch website
in repository https://gitbox.apache.org/repos/asf/zookeeper.git


The following commit(s) were added to refs/heads/website by this push:
     new cfa3f59d1 Updated website content for CVE-2025-58457
cfa3f59d1 is described below

commit cfa3f59d1d724e3c48b6606ba69f7ff8fa8bc3f7
Author: Damien Diederen <[email protected]>
AuthorDate: Wed Sep 24 11:17:45 2025 +0200

    Updated website content for CVE-2025-58457
---
 src/main/resources/markdown/security.md | 30 ++++++++++++++++++++++++++++++
 1 file changed, 30 insertions(+)

diff --git a/src/main/resources/markdown/security.md 
b/src/main/resources/markdown/security.md
index 286949b4f..b28279c08 100644
--- a/src/main/resources/markdown/security.md
+++ b/src/main/resources/markdown/security.md
@@ -30,6 +30,7 @@ their <a href="https://www.apache.org/security/";>Web page</a> 
for more informati
 
 ## Vulnerability reports
 
+* [CVE-2025-58457: Insufficient Permission Check in AdminServer 
Snapshot/Restore Commands](#CVE-2025-58457)
 * [CVE-2024-51504: Authentication bypass with IP-based authentication in Admin 
Server](#CVE-2024-51504)
 * [CVE-2024-23944: Information disclosure in persistent watcher 
handling](#CVE-2024-23944)
 * [CVE-2023-44981: Authorization bypass in SASL Quorum Peer 
Authentication](#CVE-2023-44981)
@@ -39,6 +40,35 @@ their <a href="https://www.apache.org/security/";>Web 
page</a> for more informati
 * [CVE-2016-5017: Buffer overflow vulnerability in ZooKeeper C cli 
shell](#CVE-2016-5017)
 
 
+<a name="CVE-2025-58457"></a>
+### CVE-2025-58457: Insufficient Permission Check in AdminServer 
Snapshot/Restore Commands
+
+Severity: moderate
+
+Affected versions:
+
+- Apache ZooKeeper (`org.apache.zookeeper:zookeeper`) 3.9.0 before 3.9.4
+
+Description:
+
+Improper permission check in ZooKeeper AdminServer lets authorized clients to 
run `snapshot` and `restore` command with insufficient permissions.
+
+This issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4.
+
+Users are recommended to upgrade to version 3.9.4, which fixes the issue.
+
+The issue can be mitigated by disabling both commands (via 
`admin.snapshot.enabled` and `admin.restore.enabled`), disabling the whole 
AdminServer interface (via `admin.enableServer`), or ensuring that the root ACL 
does not provide open permissions. (Note that ZooKeeper ACLs are not recursive, 
so this does not impact operations on child nodes besides notifications from 
recursive watches.)
+
+Credit:
+
+Damien Diederen <[email protected]> (reporter)
+
+References:
+
+[https://zookeeper.apache.org/](https://zookeeper.apache.org/)
+[https://www.cve.org/CVERecord?id=CVE-2025-58457](https://www.cve.org/CVERecord?id=CVE-2025-58457)
+
+
 <a name="CVE-2024-51504"></a>
 ### CVE-2024-51504: Authentication bypass with IP-based authentication in 
Admin Server
 

Reply via email to