org.apache.pulsar:pulsar-client-original is vulnerable to man-in-the-middle attacks. The vulnerability exists because the library does not verify peer TLS certificates, even when `tlsAllowInsecureConnection` is disabled via configuration, which allows a remote attacker to take control of a machine `between` the client and the server, leading to MitM attacks.
{"cnvd": [{"lastseen": "2022-10-19T05:22:15", "description": "Apache Pulsar is an Apache Foundation distributed messaging platform for cloud environments that integrates messaging, storage, and lightweight functional computing. The software supports multi-tenancy, persistent storage, multi-room cross-regional data replication, and highly scalable streaming data storage with strong consistency, high throughput, and low latency. The vulnerability is caused by Apache Pulsar Brokers and Proxies creating an internal Pulsar Admin Client that does not validate peer-to-peer TLS certificates, even if tlsAllowInsecureConnection is disabled through configuration, which could be exploited by an attacker to implement a man-in-the-middle attack through the Proxy Admin client.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-09-28T00:00:00", "type": "cnvd", "title": "Apache Pulsar Trust Management Issue Vulnerability", "bulletinFamily": "cnvd", "cvss2": {}, "cvelist": ["CVE-2022-33683"], "modified": "2022-10-18T00:00:00", "id": "CNVD-2022-69470", "href": "https://www.cnvd.org.cn/flaw/show/CNVD-2022-69470", "cvss": {"score": 0.0, "vector": "NONE"}}], "osv": [{"lastseen": "2023-01-10T06:48:42", "description": "Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle attacks, which could leak authentication data, configuration data, and any other data sent by these clients. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. This issue affects Apache Pulsar Broker and Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-09-25T00:00:27", "type": "osv", "title": "Apache Pulsar Brokers and Proxies vulnerable to Improper Certificate Validation", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2022-33683"], "modified": "2023-01-10T06:48:39", "id": "OSV:GHSA-J3QW-G67Q-7M64", "href": "https://osv.dev/vulnerability/GHSA-j3qw-g67q-7m64", "cvss": {"score": 0.0, "vector": "NONE"}}], "github": [{"lastseen": "2023-01-06T05:09:39", "description": "Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle attacks, which could leak authentication data, configuration data, and any other data sent by these clients. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. This issue affects Apache Pulsar Broker and Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-09-25T00:00:27", "type": "github", "title": "Apache Pulsar Brokers and Proxies vulnerable to Improper Certificate Validation", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2022-33683"], "modified": "2023-01-06T05:04:59", "id": "GHSA-J3QW-G67Q-7M64", "href": "https://github.com/advisories/GHSA-j3qw-g67q-7m64", "cvss": {"score": 0.0, "vector": "NONE"}}], "cve": [{"lastseen": "2022-09-27T16:41:41", "description": "Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle attacks, which could leak authentication data, configuration data, and any other data sent by these clients. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. This issue affects Apache Pulsar Broker and Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.", "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 5.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2022-09-23T10:15:00", "type": "cve", "title": "CVE-2022-33683", "cwe": ["CWE-295"], "bulletinFamily": "NVD", "cvss2": {}, "cvelist": ["CVE-2022-33683"], "modified": "2022-09-27T13:22:00", "cpe": ["cpe:/a:apache:pulsar:2.10.0"], "id": "CVE-2022-33683", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33683", "cvss": {"score": 0.0, "vector": "NONE"}, "cpe23": ["cpe:2.3:a:apache:pulsar:2.10.0:-:*:*:*:*:*:*"]}]}