{"api_version":"1","generated_at":"2026-04-22T19:08:00+00:00","cve":"CVE-2023-44981","urls":{"html":"https://cve.report/CVE-2023-44981","api":"https://cve.report/api/cve/CVE-2023-44981.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-44981","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-44981"},"summary":{"title":"CVE-2023-44981","description":"Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree. Quorum Peer authentication is not enabled by default.\n\nUsers are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue.\n\nAlternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue.\n\nSee the documentation for more details on correct cluster administration.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-10-11 12:15:00","updated_at":"2023-11-01 07:15:00"},"problem_types":["CWE-639"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/10/11/4","name":"http://www.openwall.com/lists/oss-security/2023/10/11/4","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-44981: Apache ZooKeeper: Authorization bypass in SASL\n Quorum Peer Authentication","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b","name":"https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5544","name":"https://www.debian.org/security/2023/dsa-5544","refsource":"MISC","tags":[],"title":"Debian -- Security Information -- DSA-5544-1 zookeeper","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00029.html","name":"https://lists.debian.org/debian-lts-announce/2023/10/msg00029.html","refsource":"MISC","tags":[],"title":"[SECURITY] [DLA 3624-1] zookeeper security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-44981","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44981","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"44981","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"zookeeper","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"44981","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"zookeeper","cpe6":"3.9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-44981","qid":"200055","title":"Ubuntu Security Notification for ZooKeeper Vulnerabilities (USN-6559-1)"},{"cve":"CVE-2023-44981","qid":"6000252","title":"Debian Security Update for zookeeper (DLA 3624-1)"},{"cve":"CVE-2023-44981","qid":"6000311","title":"Debian Security Update for zookeeper (DSA 5544-1)"},{"cve":"CVE-2023-44981","qid":"691372","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for apache (2bc376c0-977e-11ee-b4bc-b42e991fc52e)"},{"cve":"CVE-2023-44981","qid":"995568","title":"Java (Maven) Security Update for org.apache.zookeeper:zookeeper (GHSA-7286-pgfv-vxvh)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-44981","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree. Quorum Peer authentication is not enabled by default.\n\nUsers are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue.\n\nAlternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue.\n\nSee the documentation for more details on correct cluster administration.\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-639 Authorization Bypass Through User-Controlled Key","cweId":"CWE-639"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache ZooKeeper","version":{"version_data":[{"version_affected":"<","version_name":"3.9.0","version_value":"3.9.1"},{"version_affected":"<=","version_name":"3.8.0","version_value":"3.8.2"},{"version_affected":"<=","version_name":"3.7.0","version_value":"3.7.1"},{"version_affected":"<","version_name":"0","version_value":"3.7.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b","refsource":"MISC","name":"https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b"},{"url":"http://www.openwall.com/lists/oss-security/2023/10/11/4","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/10/11/4"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00029.html","refsource":"MISC","name":"https://lists.debian.org/debian-lts-announce/2023/10/msg00029.html"},{"url":"https://www.debian.org/security/2023/dsa-5544","refsource":"MISC","name":"https://www.debian.org/security/2023/dsa-5544"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"INTERNAL"},"credits":[{"lang":"en","value":"Damien Diederen <ddiederen@apache.org>"}]},"nvd":{"publishedDate":"2023-10-11 12:15:00","lastModifiedDate":"2023-11-01 07:15:00","problem_types":["CWE-639"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:zookeeper:3.9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8.0","versionEndExcluding":"3.8.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}