Lucene search

K
ApachePulsar3.2.0

4 matches found

CVE
CVE
added 2024/03/12 7:15 p.m.61 views

CVE-2024-27317

In Pulsar Functions Worker, authenticated users can upload functions in jar or nar files. These files, essentially zip files, are extracted by the Functions Worker. However, if a malicious file is uploaded, it could exploit a directory traversal vulnerability. This occurs when the filenames in the ...

9.9CVSS8.2AI score0.00561EPSS
CVE
CVE
added 2024/03/12 7:15 p.m.59 views

CVE-2024-27135

Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is config...

9.9CVSS8.6AI score0.00088EPSS
CVE
CVE
added 2024/03/12 7:15 p.m.58 views

CVE-2024-27894

The Pulsar Functions Worker includes a capability that permits authenticated users to create functions where the function's implementation is referenced by a URL. The supported URL schemes include "file", "http", and "https". When a function is created using this method, the Functions Worker will r...

8.8CVSS8.4AI score0.00235EPSS
CVE
CVE
added 2024/03/12 7:15 p.m.52 views

CVE-2024-28098

The vulnerability allows authenticated users with only produce or consume permissions to modify topic-level policies, such as retention, TTL, and offloading settings. These management operations should be restricted to users with the tenant admin role or super user role. This issue affects Apache P...

6.4CVSS5.7AI score0.00127EPSS