Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ex8w-efvg-2qgv
Summary
Apache ZooKeeper: Authentication bypass with IP-based authentication in Admin Server
When using IPAuthenticationProvider in ZooKeeper Admin Server there is a possibility of Authentication Bypass by Spoofing -- this only impacts IP based authentication implemented in ZooKeeper Admin Server. Default configuration of client's IP address detection in IPAuthenticationProvider, which uses HTTP request headers, is weak and allows an attacker to bypass authentication via spoofing client's IP address in request headers. Default configuration honors X-Forwarded-For HTTP header to read client's IP address. X-Forwarded-For request header is mainly used by proxy servers to identify the client and can be easily spoofed by an attacker pretending that the request comes from a different IP address. Admin Server commands, such as snapshot and restore arbitrarily can be executed on successful exploitation which could potentially lead to information leakage or service availability issues. Users are recommended to upgrade to version 3.9.3, which fixes this issue.
Aliases
0
alias CVE-2024-51504
1
alias GHSA-g93m-8x6h-g5gv
Fixed_packages
0
url pkg:deb/debian/zookeeper@0?distro=trixie
purl pkg:deb/debian/zookeeper@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@0%3Fdistro=trixie
1
url pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zookeeper@3.4.13-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-w64v-sgpz-7fhj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.4.13-6%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/zookeeper@3.8.0-11%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.8.0-11%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/zookeeper@3.9.3-1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.3-1%3Fdistro=trixie
4
url pkg:deb/debian/zookeeper@3.9.3-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.3-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-hbdm-1ts5-f7ad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.3-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
purl pkg:deb/debian/zookeeper@3.9.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zookeeper@3.9.5-1%3Fdistro=trixie
6
url pkg:maven/org.apache.zookeeper/zookeeper@3.9.3
purl pkg:maven/org.apache.zookeeper/zookeeper@3.9.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-5wwx-qqch
1
vulnerability VCID-hbdm-1ts5-f7ad
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.3
Affected_packages
0
url pkg:maven/org.apache.zookeeper/zookeeper@3.9.0
purl pkg:maven/org.apache.zookeeper/zookeeper@3.9.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1t8x-dmby-ubep
1
vulnerability VCID-6789-5wwx-qqch
2
vulnerability VCID-d5ku-8mny-tfed
3
vulnerability VCID-ex8w-efvg-2qgv
4
vulnerability VCID-hbdm-1ts5-f7ad
5
vulnerability VCID-w64v-sgpz-7fhj
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.0
1
url pkg:maven/org.apache.zookeeper/zookeeper@3.9.1
purl pkg:maven/org.apache.zookeeper/zookeeper@3.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-5wwx-qqch
1
vulnerability VCID-ex8w-efvg-2qgv
2
vulnerability VCID-hbdm-1ts5-f7ad
3
vulnerability VCID-w64v-sgpz-7fhj
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.1
2
url pkg:maven/org.apache.zookeeper/zookeeper@3.9.2
purl pkg:maven/org.apache.zookeeper/zookeeper@3.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-5wwx-qqch
1
vulnerability VCID-ex8w-efvg-2qgv
2
vulnerability VCID-hbdm-1ts5-f7ad
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51504.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-51504
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.22934
published_at 2026-04-29T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23265
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23308
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23097
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23171
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23222
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23244
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23207
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23157
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23119
published_at 2026-04-21T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.22944
published_at 2026-04-24T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.22937
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-51504
2
reference_url https://github.com/apache/zookeeper
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper
3
reference_url https://github.com/apache/zookeeper/commit/2c2b74c1c11b6531aabb1bf06782e859048d5983
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper/commit/2c2b74c1c11b6531aabb1bf06782e859048d5983
4
reference_url https://lists.apache.org/thread/b3qrmpkto5r6989qr61fw9y2x646kqlh
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:31:39Z/
url https://lists.apache.org/thread/b3qrmpkto5r6989qr61fw9y2x646kqlh
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-51504
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-51504
6
reference_url http://www.openwall.com/lists/oss-security/2024/11/06/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/11/06/5
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087275
reference_id 1087275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087275
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2324330
reference_id 2324330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2324330
9
reference_url https://github.com/advisories/GHSA-g93m-8x6h-g5gv
reference_id GHSA-g93m-8x6h-g5gv
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g93m-8x6h-g5gv
Weaknesses
0
cwe_id 290
name Authentication Bypass by Spoofing
description This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score7.0 - 9.1
Exploitability0.5
Weighted_severity8.2
Risk_score4.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ex8w-efvg-2qgv