SB2024031528 - Multiple vulnerabilities in Apache Pulsar



SB2024031528 - Multiple vulnerabilities in Apache Pulsar

Published: March 15, 2024

Security Bulletin ID SB2024031528
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2024-28098)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user with produce or consume permissions to modify topic-level policies, such as retention, TTL, and offloading settings.


2) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2024-27894)

The disclosed vulnerability allows a remote user to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input. A remote user can send a specially crafted HTTP request and read arbitrary files with privileges of the Pulsar Functions Worker process or initiate requests to internal systems.


3) Path traversal (CVE-ID: CVE-2024-27317)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to improper validation of file names inside .jar and .nar files. A remote user can upload a specially crafted archive to the application and overwrite arbitrary files on the system.


4) Code Injection (CVE-ID: CVE-2024-27135)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A remote authenticated user can send a specially crafted request and execute arbitrary Java code on the Pulsar Function worker.


Remediation

Install update from vendor's website.