The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade org.apache.zookeeper:zookeeper
to version 3.9.3 or higher.
org.apache.zookeeper:zookeeper is a centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services.
Affected versions of this package are vulnerable to Authentication Bypass by Spoofing due to the default configuration of the IPAuthenticationProvider
, which relies on HTTP request headers for IP address detection. An attacker can bypass authentication by spoofing the client's IP address in the X-Forwarded-For header. This vulnerability allows unauthorized execution of admin server commands such as snapshot and restore, potentially leading to information leakage or service availability issues.
Note:
This vulnerability only impacts IP-based authentication implemented in ZooKeeper Admin Server.