Lucene search

K
cve[email protected]CVE-2023-31007
HistoryJul 12, 2023 - 10:15 a.m.

CVE-2023-31007

2023-07-1210:15:10
CWE-287
web.nvd.nist.gov
18
apache
pulsar
broker
cve-2023-31007
vulnerability
authentication
security
apache software foundation

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%

Improper Authentication vulnerability in Apache Software Foundation Apache Pulsar Broker allows a client to stay connected to a broker after authentication data expires if the client connected through the Pulsar Proxy when the broker is configured with authenticateOriginalAuthData=false or if a client connects directly to a broker with a specially crafted connect command when the broker is configured with authenticateOriginalAuthData=false.

This issue affects Apache Pulsar: through 2.9.4, from 2.10.0 through 2.10.3, 2.11.0.

2.9 Pulsar Broker users should upgrade to at least 2.9.5.
2.10 Pulsar Broker users should upgrade to at least 2.10.4.
2.11 Pulsar Broker users should upgrade to at least 2.11.1.
3.0 Pulsar Broker users are unaffected.
Any users running the Pulsar Broker for 2.8.* and earlier should upgrade to one of the above patched versions.

Affected configurations

Vulners
NVD
Node
apachepulsarRange2.9.5
OR
apachepulsarRange2.10.3
OR
apachepulsarRange2.11.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Pulsar",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "2.9.5",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2.10.3",
        "status": "affected",
        "version": "2.10.0",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "2.11.0"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%