Lucene search

K

Pulsar Security Vulnerabilities - CVSS Score 5 - 6

cve
cve

CVE-2022-33681

Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to the Pulsar Broker are vulnerable. Authentication da...

5.9CVSS

5.8AI Score

0.0005EPSS

2022-09-23 10:15 AM
48
8
cve
cve

CVE-2022-33682

TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle atta...

5.9CVSS

5.5AI Score

0.0004EPSS

2022-09-23 10:15 AM
40
9
cve
cve

CVE-2022-33683

Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle ...

5.9CVSS

5.6AI Score

0.0005EPSS

2022-09-23 10:15 AM
40
7