Lucene search

K
ApachePulsar

4 matches found

CVE
CVE
added 2021/05/26 1:15 p.m.81 views

CVE-2021-22160

If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).

9.8CVSS9.4AI score0.18529EPSS
CVE
CVE
added 2024/03/12 7:15 p.m.61 views

CVE-2024-27317

In Pulsar Functions Worker, authenticated users can upload functions in jar or nar files. These files, essentially zip files, are extracted by the Functions Worker. However, if a malicious file is uploaded, it could exploit a directory traversal vulnerability. This occurs when the filenames in the ...

9.9CVSS8.2AI score0.00561EPSS
CVE
CVE
added 2024/03/12 7:15 p.m.59 views

CVE-2024-27135

Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is config...

9.9CVSS8.6AI score0.00088EPSS
CVE
CVE
added 2023/07/12 10:15 a.m.52 views

CVE-2023-30429

Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mTLS authentication to authenticate with the Pulsar F...

9.6CVSS9.2AI score0.00069EPSS