Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJVHGGx-d9_mBWHU=hr74CsrsxvLwsq65+ZHhOGiKU3qgkw=nQ@mail.gmail.com>
Date: Tue, 25 May 2021 21:32:35 +0800
From: PengHui Li <penghui@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2021-22160 Apache Pulsar Information Disclosure

CVE-2021-22160 Apache Pulsar Information Disclosure

Severity: High

Versions Affected:
Apache Pulsar < 2.7.1

Description:
If Apache Pulsar is configured to authenticate clients using tokens
based on JSON Web Tokens (JWT), the signature of the token is not
validated if the algorithm of the presented token is set to "none".
This allows an attacker to connect to Pulsar instances as any user
(incl. admins).

Mitigation:
Users of the affected versions should apply one of the following
mitigations:
Upgrade to Apache Pulsar 2.7.1 or later

Credit:
This issue was identified by Peter Stöckli

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.