Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/zookeeper@0?distro=trixie
Typedeb
Namespacedebian
Namezookeeper
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.4.9-1
Latest_non_vulnerable_version3.9.5-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-ex8w-efvg-2qgv
vulnerability_id VCID-ex8w-efvg-2qgv
summary
Apache ZooKeeper: Authentication bypass with IP-based authentication in Admin Server
When using IPAuthenticationProvider in ZooKeeper Admin Server there is a possibility of Authentication Bypass by Spoofing -- this only impacts IP based authentication implemented in ZooKeeper Admin Server. Default configuration of client's IP address detection in IPAuthenticationProvider, which uses HTTP request headers, is weak and allows an attacker to bypass authentication via spoofing client's IP address in request headers. Default configuration honors X-Forwarded-For HTTP header to read client's IP address. X-Forwarded-For request header is mainly used by proxy servers to identify the client and can be easily spoofed by an attacker pretending that the request comes from a different IP address. Admin Server commands, such as snapshot and restore arbitrarily can be executed on successful exploitation which could potentially lead to information leakage or service availability issues. Users are recommended to upgrade to version 3.9.3, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51504.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-51504
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.22974
published_at 2026-05-12T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23244
published_at 2026-04-11T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23207
published_at 2026-04-12T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-13T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-16T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23157
published_at 2026-04-18T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23119
published_at 2026-04-21T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.22944
published_at 2026-04-24T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.22937
published_at 2026-04-26T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.22934
published_at 2026-04-29T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.2283
published_at 2026-05-05T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.22913
published_at 2026-05-07T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.2299
published_at 2026-05-09T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.22957
published_at 2026-05-11T12:55:00Z
14
value 0.00078
scoring_system epss
scoring_elements 0.23265
published_at 2026-04-02T12:55:00Z
15
value 0.00078
scoring_system epss
scoring_elements 0.23308
published_at 2026-04-04T12:55:00Z
16
value 0.00078
scoring_system epss
scoring_elements 0.23097
published_at 2026-04-07T12:55:00Z
17
value 0.00078
scoring_system epss
scoring_elements 0.23171
published_at 2026-04-08T12:55:00Z
18
value 0.00078
scoring_system epss
scoring_elements 0.23222
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-51504
2
reference_url https://github.com/apache/zookeeper
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper
3
reference_url https://github.com/apache/zookeeper/commit/2c2b74c1c11b6531aabb1bf06782e859048d5983
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper/commit/2c2b74c1c11b6531aabb1bf06782e859048d5983
4
reference_url https://lists.apache.org/thread/b3qrmpkto5r6989qr61fw9y2x646kqlh
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:31:39Z/
url https://lists.apache.org/thread/b3qrmpkto5r6989qr61fw9y2x646kqlh
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-51504
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-51504
6
reference_url http://www.openwall.com/lists/oss-security/2024/11/06/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/11/06/5
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087275
reference_id 1087275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087275
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2324330
reference_id 2324330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2324330
9
reference_url https://github.com/advisories/GHSA-g93m-8x6h-g5gv
reference_id GHSA-g93m-8x6h-g5gv
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g93m-8x6h-g5gv
fixed_packages
0
url pkg:deb/debian/zookeeper@0?distro=trixie
purl pkg:deb/debian/zookeeper@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@0%3Fdistro=trixie
1
url pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-w64v-sgpz-7fhj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.13-6%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.8.0-11%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/zookeeper@3.9.3-1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.3-1%3Fdistro=trixie
4
url pkg:deb/debian/zookeeper@3.9.3-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.3-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-hbdm-1ts5-f7ad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.3-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.5-1%3Fdistro=trixie
aliases CVE-2024-51504, GHSA-g93m-8x6h-g5gv
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex8w-efvg-2qgv
1
url VCID-hbdm-1ts5-f7ad
vulnerability_id VCID-hbdm-1ts5-f7ad
summary
Apache ZooKeeper: Insufficient Permission Check in AdminServer Snapshot/Restore Commands
Improper permission checks in the AdminServer allow an authenticated client with insufficient privileges to invoke the `snapshot` and `restore` commands. The intended requirement is authentication and authorization on the root path (`/`) with **ALL** permission for these operations; however, affected versions permit invocation without that level of authorization. The primary risk is disclosure of cluster state via snapshots to a lesser-privileged client.

*   **Affected:** `org.apache.zookeeper:zookeeper` 3.9.0 through 3.9.3.
*   **Fixed:** 3.9.4 (ZOOKEEPER-4964 “check permissions individually during admin server auth”).
*   **Mitigations:**
*   Disable both commands (`admin.snapshot.enabled`, `admin.restore.enabled`).
*   Disable AdminServer (`admin.enableServer`).
*   Ensure the root ACL is not open; note that ZooKeeper ACLs are not recursive.
*   Upgrade to 3.9.4.
references
0
reference_url http://github.com/apache/zookeeper/commit/71e173fcbcc9deb784081cf867bd045df3c32635
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://github.com/apache/zookeeper/commit/71e173fcbcc9deb784081cf867bd045df3c32635
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58457.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58457.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58457
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.27853
published_at 2026-05-09T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.27827
published_at 2026-05-07T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.2777
published_at 2026-05-11T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.27764
published_at 2026-05-05T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.27786
published_at 2026-05-12T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.28968
published_at 2026-04-21T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.3274
published_at 2026-04-04T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32705
published_at 2026-04-02T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32561
published_at 2026-04-07T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32609
published_at 2026-04-08T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32634
published_at 2026-04-09T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32636
published_at 2026-04-11T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32598
published_at 2026-04-12T12:55:00Z
13
value 0.00131
scoring_system epss
scoring_elements 0.3257
published_at 2026-04-13T12:55:00Z
14
value 0.00131
scoring_system epss
scoring_elements 0.32608
published_at 2026-04-16T12:55:00Z
15
value 0.00131
scoring_system epss
scoring_elements 0.32585
published_at 2026-04-18T12:55:00Z
16
value 0.00141
scoring_system epss
scoring_elements 0.33731
published_at 2026-04-29T12:55:00Z
17
value 0.00141
scoring_system epss
scoring_elements 0.3384
published_at 2026-04-24T12:55:00Z
18
value 0.00141
scoring_system epss
scoring_elements 0.33817
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58457
3
reference_url https://github.com/apache/zookeeper
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper
4
reference_url https://lists.apache.org/thread/r5yol0kkhx2fzw22pxk1ozwm3oc6yxrx
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:47:31Z/
url https://lists.apache.org/thread/r5yol0kkhx2fzw22pxk1ozwm3oc6yxrx
5
reference_url https://zookeeper.apache.org/doc/current/zookeeperSnapshotAndRestore.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://zookeeper.apache.org/doc/current/zookeeperSnapshotAndRestore.html
6
reference_url https://zookeeper.apache.org/doc/r3.9.4/releasenotes.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://zookeeper.apache.org/doc/r3.9.4/releasenotes.html
7
reference_url https://zookeeper.apache.org/security.html#CVE-2025-58457
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://zookeeper.apache.org/security.html#CVE-2025-58457
8
reference_url http://www.openwall.com/lists/oss-security/2025/09/24/10
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/09/24/10
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116339
reference_id 1116339
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116339
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397773
reference_id 2397773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397773
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-58457
reference_id CVE-2025-58457
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-58457
12
reference_url https://github.com/advisories/GHSA-2hmj-97jw-28jh
reference_id GHSA-2hmj-97jw-28jh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2hmj-97jw-28jh
fixed_packages
0
url pkg:deb/debian/zookeeper@0?distro=trixie
purl pkg:deb/debian/zookeeper@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@0%3Fdistro=trixie
1
url pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-w64v-sgpz-7fhj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.13-6%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.8.0-11%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/zookeeper@3.9.4-1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.4-1%3Fdistro=trixie
4
url pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.5-1%3Fdistro=trixie
aliases CVE-2025-58457, GHSA-2hmj-97jw-28jh
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbdm-1ts5-f7ad
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@0%3Fdistro=trixie