Lucene search

K
redhatcveRedhat.comRH:CVE-2023-25194
HistoryJun 21, 2023 - 4:24 p.m.

CVE-2023-25194

2023-06-2116:24:00
redhat.com
access.redhat.com
11
apache kafka connect
rest api
sasl property
authenticated operator
ldap server
deserialization
denial of service
arbitrary code

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.97 High

EPSS

Percentile

99.8%

A flaw was found in Apache Kafka Connect’s REST API that permits configuration of SASL property by an authenticated operator, which could allow connection to a malicious LDAP server and subsequent deserialization of malicious content. This issue could allow an authenticated attacker to cause a denial of service or execute arbitrary code on the server, given presence of vulnerable classes on the server’s classpath.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.97 High

EPSS

Percentile

99.8%