Lucene search

K
githubGitHub Advisory DatabaseGHSA-3MG9-M3F6-V7FQ
HistorySep 25, 2022 - 12:00 a.m.

Proxy component of Apache Pulsar subject to abuse as Denial of Service endpoint

2022-09-2500:00:18
CWE-20
GitHub Advisory Database
github.com
14
apache pulsar
proxy
input validation

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

23.9%

Improper Input Validation vulnerability in Proxy component of Apache Pulsar allows an attacker to make TCP/IP connection attempts that originate from the Pulsar Proxy’s IP address. When the Apache Pulsar Proxy component is used, it is possible to attempt to open TCP/IP connections to any IP address and port that the Pulsar Proxy can connect to. An attacker could use this as a way for DoS attacks that originate from the Pulsar Proxy’s IP address. It hasn’t been detected that the Pulsar Proxy authentication can be bypassed. The attacker will have to have a valid token to a properly secured Pulsar Proxy. This issue affects Apache Pulsar Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.2; 2.9.0 to 2.9.1; 2.6.4 and earlier.

Affected configurations

Vulners
Node
org.apache.pulsarpulsarRange2.9.02.9.1
OR
org.apache.pulsarpulsarRange2.8.02.8.2
OR
org.apache.pulsarpulsarRange<2.7.5
VendorProductVersionCPE
org.apache.pulsarpulsar*cpe:2.3:a:org.apache.pulsar:pulsar:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

23.9%

Related for GHSA-3MG9-M3F6-V7FQ