This is an automated email from the ASF dual-hosted git repository.

lhotari pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/pulsar-site.git


The following commit(s) were added to refs/heads/main by this push:
     new 944082e1871 Add CVE-2025-30677
944082e1871 is described below

commit 944082e187149efdfab156ab8c11ee0bcb00ffab
Author: Lari Hotari <[email protected]>
AuthorDate: Wed Apr 9 14:20:06 2025 +0300

    Add CVE-2025-30677
---
 security/CVE-2025-30677.md | 35 +++++++++++++++++++++++++++++++++++
 security/index.md          |  7 +++++--
 2 files changed, 40 insertions(+), 2 deletions(-)

diff --git a/security/CVE-2025-30677.md b/security/CVE-2025-30677.md
new file mode 100644
index 00000000000..93cf952a0fa
--- /dev/null
+++ b/security/CVE-2025-30677.md
@@ -0,0 +1,35 @@
+# CVE-2025-30677: Apache Pulsar IO Kafka Connector, Apache Pulsar IO Kafka 
Connect Adaptor: Sensitive information logged in Pulsar's Apache Kafka 
Connectors 
+
+## Affected versions
+
+- Apache Pulsar IO Kafka Connector 2.3.0 before 3.0.11
+- Apache Pulsar IO Kafka Connector 3.1.0 before 3.3.6
+- Apache Pulsar IO Kafka Connector 4.0.0 before 4.0.4
+- Apache Pulsar IO Kafka Connect Adaptor 2.3.0 before 3.0.11
+- Apache Pulsar IO Kafka Connect Adaptor 3.1.0 before 3.3.6
+- Apache Pulsar IO Kafka Connect Adaptor 4.0.0 before 4.0.4
+
+## Description
+
+Apache Pulsar contains multiple connectors for integrating with Apache Kafka. 
The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect 
Adaptor Sink Connector log sensitive configuration properties in plain text in 
application logs.
+
+This vulnerability can lead to unintended exposure of credentials in log 
files, potentially allowing attackers with access to these logs to obtain 
Apache Kafka credentials. The vulnerability's impact is limited by the fact 
that an attacker would need access to the application logs to exploit this 
issue.
+
+This issue affects Apache Pulsar IO's Apache Kafka connectors in all versions 
before 3.0.11, 3.3.6, and 4.0.4.
+
+- 3.0.x version users should upgrade to at least 3.0.11.
+
+- 3.3.x version users should upgrade to at least 3.3.6.
+
+- 4.0.x version users should upgrade to at least 4.0.4.
+
+Users operating versions prior to those listed above should upgrade to the 
aforementioned patched versions or newer versions.
+
+## Credit
+
+Kyler Katz (finder)
+
+## References
+
+- https://lists.apache.org/thread/zv5fwwrh374r1p5cmksxcd40ssxxko3d
+- https://www.cve.org/CVERecord?id=CVE-2025-30677
\ No newline at end of file
diff --git a/security/index.md b/security/index.md
index f932cee0ad0..56077b92242 100644
--- a/security/index.md
+++ b/security/index.md
@@ -13,6 +13,10 @@ It is the responsibility of the security vulnerability 
handling project team (Ap
 Please subscribe to the [[email protected] mailing 
list](https://lists.apache.org/[email protected]) to receive 
Apache Pulsar security advisories when they are published.
 For instructions on how to subscribe, please see 
https://pulsar.apache.org/contact/.
 
+### 2025
+
+* 2024-04-09 [CVE-2025-30677](CVE-2025-30677.md) Apache Pulsar IO Kafka 
Connector, Apache Pulsar IO Kafka Connect Adaptor: Sensitive information logged 
in Pulsar's Apache Kafka Connectors
+
 ### 2024
 
 * 2024-10-04 [Apache Pulsar 3.3.2 released with important security fix for 
CVE-2024-47561](https://lists.apache.org/thread/o7xg4odt1ms1g46f3mjn39bw5kq3hks0)
@@ -45,5 +49,4 @@ For instructions on how to subscribe, please see 
https://pulsar.apache.org/conta
 
 ### 2021
 
-* 2021-05-25 [CVE-2021-22160](CVE-2021-22160.md) Authentication with JWT 
allows use of "none"-algorithm
-
+* 2021-05-25 [CVE-2021-22160](CVE-2021-22160.md) Authentication with JWT 
allows use of "none"-algorithm
\ No newline at end of file

Reply via email to