Lucene search

K
nvd[email protected]NVD:CVE-2023-30429
HistoryJul 12, 2023 - 10:15 a.m.

CVE-2023-30429

2023-07-1210:15:09
CWE-863
web.nvd.nist.gov
3
cve-2023-30429
apache pulsar
authorization
vulnerability
privilege escalation
mitigation
upgrade
pulsar function worker

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

42.2%

Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar.

This issue affects Apache Pulsar: before 2.10.4, and 2.11.0.

When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mTLS authentication to authenticate with the Pulsar Function Worker, the Pulsar Function Worker incorrectly performs authorization by using the Proxy’s role for authorization instead of the client’s role, which can lead to privilege escalation, especially if the proxy is configured with a superuser role.

The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version.

2.10 Pulsar Function Worker users should upgrade to at least 2.10.4.
2.11 Pulsar Function Worker users should upgrade to at least 2.11.1.
3.0 Pulsar Function Worker users are unaffected.
Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.

Affected configurations

Nvd
Node
apachepulsarRange<2.10.4
OR
apachepulsarMatch2.11.0-
OR
apachepulsarMatch2.11.0candidate_1
OR
apachepulsarMatch2.11.0candidate_5
VendorProductVersionCPE
apachepulsar*cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
apachepulsar2.11.0cpe:2.3:a:apache:pulsar:2.11.0:-:*:*:*:*:*:*
apachepulsar2.11.0cpe:2.3:a:apache:pulsar:2.11.0:candidate_1:*:*:*:*:*:*
apachepulsar2.11.0cpe:2.3:a:apache:pulsar:2.11.0:candidate_5:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.001

Percentile

42.2%

Related for NVD:CVE-2023-30429