CVE-2021-22160 – org.apache.pulsar:pulsar
Package
Manager: maven
Name: org.apache.pulsar:pulsar
Vulnerable Version: >=0 <2.7.2
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.18529 pctl0.95006
Details
Improper Verification of Cryptographic Signature in Apache Pulsar in TensorFlow If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
Metadata
Created: 2021-06-01T21:53:49Z
Modified: 2022-06-06T18:16:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-3cv4-xxv7-934q/GHSA-3cv4-xxv7-934q.json
CWE IDs: ["CWE-347"]
Alternative ID: GHSA-3cv4-xxv7-934q
Finding: F204
Auto approve: 1