Miggo Logo

CVE-2024-56325: Apache Pinot Vulnerable to Authentication Bypass

N/A

CVSS Score

Basic Information

EPSS Score
0.89198%
Published
4/1/2025
Updated
4/1/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.pinot:pinotmaven< 1.3.01.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path handling in authentication checks. Key indicators:

  1. The security advisory shows authentication bypass via path manipulation with semicolons and dots
  2. BasicAuthAccessControlFactory is Pinot's known authentication component
  3. createUser endpoint is the protected resource being accessed
  4. The path parsing discrepancy between security filters (using raw URI) and request routing (using parsed path) would explain the bypass

While exact code changes aren't available, the combination of:

  • Security checks relying on request URI parsing
  • User management endpoints being protected resources
  • Path parameter handling differences between web server and application strongly suggests the authentication check in BasicAuthAccessControl and the subsequent controller method would appear in runtime traces during exploitation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ut**nti**tion *yp*ss Issu* I* t** p*t* *o*s not *ont*in / *n* *ont*in., *ut**nti**tion is not r*quir**. *xp**t** Norm*l R*qu*st *n* R*spons* *x*mpl* *url -X POST -* "*ont*nt-Typ*: *ppli**tion/json" -* {\"us*rn*m*\":\"***k*\",\"p*sswor*\":\"***k\"

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* **n*lin* in *ut**nti**tion ****ks. K*y in*i**tors: *. T** s**urity **visory s*ows *ut**nti**tion *yp*ss vi* p*t* m*nipul*tion wit* s*mi*olons *n* *ots *. **si**ut*****ss*ontrol***tory is Pinot's known *ut**n