Логотип exploitDog
bind: "CVE-2025-27818"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-27818"

Количество 6

Количество 6

redhat логотип

CVE-2025-27818

3 месяца назад

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the K...

CVSS3: 8
EPSS: Низкий
nvd логотип

CVE-2025-27818

3 месяца назад

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafk

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2025-27818

3 месяца назад

A possible security vulnerability has been identified in Apache Kafka. ...

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-76qp-h5mr-frr4

3 месяца назад

Apache Kafka Deserialization of Untrusted Data vulnerability

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-08198

3 месяца назад

Уязвимость диспетчера сообщений Apache Kafka, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить удаленный код

CVSS3: 9.9
EPSS: Низкий
redos логотип

ROS-20250804-02

около 1 месяца назад

Множественные уязвимости apache-kafka

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-27818

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the K...

CVSS3: 8
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-27818

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config` property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafk

CVSS3: 8.8
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-27818

A possible security vulnerability has been identified in Apache Kafka. ...

CVSS3: 8.8
0%
Низкий
3 месяца назад
github логотип
GHSA-76qp-h5mr-frr4

Apache Kafka Deserialization of Untrusted Data vulnerability

CVSS3: 8.8
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-08198

Уязвимость диспетчера сообщений Apache Kafka, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить удаленный код

CVSS3: 9.9
0%
Низкий
3 месяца назад
redos логотип
ROS-20250804-02

Множественные уязвимости apache-kafka

CVSS3: 9.9
около 1 месяца назад

Уязвимостей на страницу