CVE-2024-56325: Apache Pinot Vulnerable to Authentication Bypass
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.89198%
CWE
Published
4/1/2025
Updated
4/1/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.pinot:pinot | maven | < 1.3.0 | 1.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path handling in authentication checks. Key indicators:
- The security advisory shows authentication bypass via path manipulation with semicolons and dots
- BasicAuthAccessControlFactory is Pinot's known authentication component
- createUser endpoint is the protected resource being accessed
- The path parsing discrepancy between security filters (using raw URI) and request routing (using parsed path) would explain the bypass
While exact code changes aren't available, the combination of:
- Security checks relying on request URI parsing
- User management endpoints being protected resources
- Path parameter handling differences between web server and application strongly suggests the authentication check in BasicAuthAccessControl and the subsequent controller method would appear in runtime traces during exploitation.