<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/comments/feed</id>
  <title>Most recent comments.</title>
  <updated>2026-04-26T06:30:48.146666+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent comments.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/comment/a9f2cad3-dbfc-4703-9c5f-9af054301f88</id>
    <title>Apache Pinot Improper Neutralization of Special Elements Authentication Bypass Vulnerability</title>
    <updated>2026-04-26T06:30:48.149968+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://vulnerability.circl.lu/user/adulau</uri>
    </author>
    <content>CVE ID	CVE-2024-56325
CVSS SCORE	9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS	Apache
AFFECTED PRODUCTS	Pinot
VULNERABILITY DETAILS	
This vulnerability allows remote attackers to bypass authentication on affected installations of Apache Pinot. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the AuthenticationFilter class. The issue results from insufficient neutralization of special characters in a URI. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS	
Fixed in version 1.3.0</content>
    <link href="https://vulnerability.circl.lu/comment/a9f2cad3-dbfc-4703-9c5f-9af054301f88"/>
    <published>2025-03-11T05:25:53.938762+00:00</published>
  </entry>
</feed>
