Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-56128

Опубликовано: 18 дек. 2024
Источник: nvd
CVSS3: 5.3
EPSS Низкий

Описание

Incorrect Implementation of Authentication Algorithm in Apache Kafka's SCRAM implementation.

Issue Summary: Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802 [1]. Specifically, as per RFC 5802, the server must verify that the nonce sent by the client in the second message matches the nonce sent by the server in its first message. However, Kafka's SCRAM implementation did not perform this validation.

Impact: This vulnerability is exploitable only when an attacker has plaintext access to the SCRAM authentication exchange. However, the usage of SCRAM over plaintext is strongly discouraged as it is considered an insecure practice [2]. Apache Kafka recommends deploying SCRAM exclusively with TLS encryption to protect SCRAM exchanges from interception [3]. Deployments using SCRAM with TLS are not affected by this issue.

How to Detect If You Are Impacted: If your deployment uses SCRAM authent

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*
Версия от 0.10.2.0 (включая) до 3.7.2 (исключая)
cpe:2.3:a:apache:kafka:3.8.0:*:*:*:*:*:*:*

EPSS

Процентиль: 32%
0.00123
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-303
NVD-CWE-Other

Связанные уязвимости

CVSS3: 7.4
redhat
около 1 года назад

Incorrect Implementation of Authentication Algorithm in Apache Kafka's SCRAM implementation. Issue Summary: Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802 [1]. Specifically, as per RFC 5802, the server must verify that the nonce sent by the client in the second message matches the nonce sent by the server in its first message. However, Kafka's SCRAM implementation did not perform this validation. Impact: This vulnerability is exploitable only when an attacker has plaintext access to the SCRAM authentication exchange. However, the usage of SCRAM over plaintext is strongly discouraged as it is considered an insecure practice [2]. Apache Kafka recommends deploying SCRAM exclusively with TLS encryption to protect SCRAM exchanges from interception [3]. Deployments using SCRAM with TLS are not affected by this issue. How to Detect If You Are Impacted: If your deployment uses SCRAM authent...

CVSS3: 5.3
debian
около 1 года назад

Incorrect Implementation of Authentication Algorithm in Apache Kafka's ...

CVSS3: 5.3
github
около 1 года назад

Apache Kafka's SCRAM implementation Incorrectly Implements Authentication Algorithm

CVSS3: 5.3
fstec
около 1 года назад

Уязвимость механизма аутентификации Salted Challenge Response Authentication Mechanism (SCRAM) диспетчера сообщений Apache Kafka, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
redos
6 месяцев назад

Уязвимость apache-kafka

EPSS

Процентиль: 32%
0.00123
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-303
NVD-CWE-Other