|
Message-ID: <CAJDuW=AhXUDhK4Xo-rZbUT2JhaYkaJDx2-f0N5R-E+KMWjmSpQ@mail.gmail.com> Date: Wed, 10 Jul 2019 14:25:40 -0700 From: Jason Gustafson <jason@...fluent.io> To: security@...ka.apache.org, oss-security@...ts.openwall.com, announce@...che.org, Users <users@...ka.apache.org>, dev <dev@...ka.apache.org>, kafka-clients <kafka-clients@...glegroups.com> Subject: CVE-2018-17196: Potential to bypass transaction/idempotent ACL checks in Apache Kafka CVE-2018-17196: Potential to bypass transaction/idempotent ACL checks in Apache Kafka Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: Apache Kafka 0.11.0.0 - 2.1.0 Description: It is possible to manually craft a Produce request which bypasses transaction/idempotent ACL validation. Only authenticated clients with Write permission on the respective topics are able to exploit this vulnerability. Mitigation: Apache Kafka users should upgrade to 2.1.1 or later where this vulnerability has been fixed. Acknowledgements: This issue was reported by Jason Gustafson Regards, Jason
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.