<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent comments.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent comments.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 26 Apr 2026 18:50:05 +0000</lastBuildDate>
    <item>
      <title>Apache Pinot Improper Neutralization of Special Elements Authentication Bypass Vulnerability</title>
      <link>https://vulnerability.circl.lu/comment/a9f2cad3-dbfc-4703-9c5f-9af054301f88</link>
      <description>CVE ID	CVE-2024-56325
CVSS SCORE	9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS	Apache
AFFECTED PRODUCTS	Pinot
VULNERABILITY DETAILS	
This vulnerability allows remote attackers to bypass authentication on affected installations of Apache Pinot. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the AuthenticationFilter class. The issue results from insufficient neutralization of special characters in a URI. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS	
Fixed in version 1.3.0</description>
      <content:encoded>CVE ID	CVE-2024-56325
CVSS SCORE	9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS	Apache
AFFECTED PRODUCTS	Pinot
VULNERABILITY DETAILS	
This vulnerability allows remote attackers to bypass authentication on affected installations of Apache Pinot. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the AuthenticationFilter class. The issue results from insufficient neutralization of special characters in a URI. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS	
Fixed in version 1.3.0</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/comment/a9f2cad3-dbfc-4703-9c5f-9af054301f88</guid>
      <pubDate>Tue, 11 Mar 2025 05:25:53 +0000</pubDate>
    </item>
  </channel>
</rss>
