Lucene search

K
cve[email protected]CVE-2024-27317
HistoryMar 12, 2024 - 7:15 p.m.

CVE-2024-27317

2024-03-1219:15:47
CWE-22
web.nvd.nist.gov
32
cve-2024-27317
apache pulsar
pulsar function worker
directory traversal
security vulnerability
system upgrade
nvd
cve

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

In Pulsar Functions Worker, authenticated users can upload functions in jar or nar files. These files, essentially zip files, are extracted by the Functions Worker. However, if a malicious file is uploaded, it could exploit a directory traversal vulnerability. This occurs when the filenames in the zip files, which aren’t properly validated, contain special elements like “…”, altering the directory path. This could allow an attacker to create or modify files outside of the designated extraction directory, potentially influencing system behavior. This vulnerability also applies to the Pulsar Broker when it is configured with “functionsWorkerEnabled=true”.

This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0.

2.10 Pulsar Function Worker users should upgrade to at least 2.10.6.
2.11 Pulsar Function Worker users should upgrade to at least 2.11.4.
3.0 Pulsar Function Worker users should upgrade to at least 3.0.3.
3.1 Pulsar Function Worker users should upgrade to at least 3.1.3.
3.2 Pulsar Function Worker users should upgrade to at least 3.2.1.

Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.

Affected configurations

Vulners
Node
apachepulsarRange2.10.6
OR
apachepulsarRange2.11.4
OR
apachepulsarRange3.0.3
OR
apachepulsarRange3.1.3
OR
apachepulsarRange3.2.1

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Pulsar",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "2.10.6",
        "status": "affected",
        "version": "2.4.0",
        "versionType": "semver"
      },
      {
        "lessThan": "2.11.4",
        "status": "affected",
        "version": "2.11.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.0.3",
        "status": "affected",
        "version": "3.0.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.1.3",
        "status": "affected",
        "version": "3.1.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.2.1",
        "status": "affected",
        "version": "3.2.0",
        "versionType": "semver"
      }
    ]
  }
]

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%