Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-27894

Опубликовано: 12 мар. 2024
Источник: nvd
CVSS3: 8.5
CVSS3: 8.8
EPSS Низкий

Описание

The Pulsar Functions Worker includes a capability that permits authenticated users to create functions where the function's implementation is referenced by a URL. The supported URL schemes include "file", "http", and "https". When a function is created using this method, the Functions Worker will retrieve the implementation from the URL provided by the user. However, this feature introduces a vulnerability that can be exploited by an attacker to gain unauthorized access to any file that the Pulsar Functions Worker process has permissions to read. This includes reading the process environment which potentially includes sensitive information, such as secrets. Furthermore, an attacker could leverage this vulnerability to use the Pulsar Functions Worker as a proxy to access the content of remote HTTP and HTTPS endpoint URLs. This could also be used to carry out denial of service attacks. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
Версия от 2.4.0 (включая) до 2.10.6 (исключая)
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
Версия от 2.11.0 (включая) до 2.11.4 (исключая)
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
Версия от 3.0.0 (включая) до 3.0.3 (исключая)
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
Версия от 3.1.0 (включая) до 3.1.3 (исключая)
cpe:2.3:a:apache:pulsar:3.2.0:-:*:*:*:*:*:*

EPSS

Процентиль: 54%
0.00314
Низкий

8.5 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 8.5
redhat
почти 2 года назад

The Pulsar Functions Worker includes a capability that permits authenticated users to create functions where the function's implementation is referenced by a URL. The supported URL schemes include "file", "http", and "https". When a function is created using this method, the Functions Worker will retrieve the implementation from the URL provided by the user. However, this feature introduces a vulnerability that can be exploited by an attacker to gain unauthorized access to any file that the Pulsar Functions Worker process has permissions to read. This includes reading the process environment which potentially includes sensitive information, such as secrets. Furthermore, an attacker could leverage this vulnerability to use the Pulsar Functions Worker as a proxy to access the content of remote HTTP and HTTPS endpoint URLs. This could also be used to carry out denial of service attacks. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnab...

CVSS3: 8.8
github
почти 2 года назад

Apache Pulsar: Pulsar Functions Worker Allows Unauthorized File Access and Unauthorized HTTP/HTTPS Proxying

CVSS3: 6.3
fstec
почти 2 года назад

Уязвимость модуля Pulsar Functions Worker облачной платформы для распределенного обмена сообщениями и потоковой передачи Apache Pulsar, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 54%
0.00314
Низкий

8.5 High

CVSS3

8.8 High

CVSS3

Дефекты

CWE-20