logo

CVE-2021-22160 org.apache.pulsar:pulsar

Package

Manager: maven
Name: org.apache.pulsar:pulsar
Vulnerable Version: >=0 <2.7.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.18529 pctl0.95006

Details

Improper Verification of Cryptographic Signature in Apache Pulsar in TensorFlow If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).

Metadata

Created: 2021-06-01T21:53:49Z
Modified: 2022-06-06T18:16:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-3cv4-xxv7-934q/GHSA-3cv4-xxv7-934q.json
CWE IDs: ["CWE-347"]
Alternative ID: GHSA-3cv4-xxv7-934q
Finding: F204
Auto approve: 1