Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-02678

Опубликовано: 12 мар. 2024
Источник: fstec
CVSS3: 6.3
CVSS2: 4.9
EPSS Низкий

Описание

Уязвимость модуля Pulsar Functions Worker облачной платформы для распределенного обмена сообщениями и потоковой передачи Apache Pulsar связана с использованием файлов и каталогов, доступных внешним сторонам. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Вендор

Apache Software Foundation

Наименование ПО

Pulsar

Версия ПО

от 2.4.0 до 2.10.6 (Pulsar)
от 2.11.0 до 2.11.4 (Pulsar)
от 3.0.0 до 3.0.3 (Pulsar)
от 3.1.0 до 3.1.3 (Pulsar)
от 3.2.0 до 3.2.1 (Pulsar)

Тип ПО

Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,9)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,3)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://pulsar.apache.org/security/CVE-2024-27894/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 54%
0.00314
Низкий

6.3 Medium

CVSS3

4.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.5
redhat
почти 2 года назад

The Pulsar Functions Worker includes a capability that permits authenticated users to create functions where the function's implementation is referenced by a URL. The supported URL schemes include "file", "http", and "https". When a function is created using this method, the Functions Worker will retrieve the implementation from the URL provided by the user. However, this feature introduces a vulnerability that can be exploited by an attacker to gain unauthorized access to any file that the Pulsar Functions Worker process has permissions to read. This includes reading the process environment which potentially includes sensitive information, such as secrets. Furthermore, an attacker could leverage this vulnerability to use the Pulsar Functions Worker as a proxy to access the content of remote HTTP and HTTPS endpoint URLs. This could also be used to carry out denial of service attacks. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnab...

CVSS3: 8.5
nvd
почти 2 года назад

The Pulsar Functions Worker includes a capability that permits authenticated users to create functions where the function's implementation is referenced by a URL. The supported URL schemes include "file", "http", and "https". When a function is created using this method, the Functions Worker will retrieve the implementation from the URL provided by the user. However, this feature introduces a vulnerability that can be exploited by an attacker to gain unauthorized access to any file that the Pulsar Functions Worker process has permissions to read. This includes reading the process environment which potentially includes sensitive information, such as secrets. Furthermore, an attacker could leverage this vulnerability to use the Pulsar Functions Worker as a proxy to access the content of remote HTTP and HTTPS endpoint URLs. This could also be used to carry out denial of service attacks. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled

CVSS3: 8.8
github
почти 2 года назад

Apache Pulsar: Pulsar Functions Worker Allows Unauthorized File Access and Unauthorized HTTP/HTTPS Proxying

EPSS

Процентиль: 54%
0.00314
Низкий

6.3 Medium

CVSS3

4.9 Medium

CVSS2