This is an automated email from the ASF dual-hosted git repository.
lhotari pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/pulsar-site.git
The following commit(s) were added to refs/heads/main by this push:
new 944082e1871 Add CVE-2025-30677
944082e1871 is described below
commit 944082e187149efdfab156ab8c11ee0bcb00ffab
Author: Lari Hotari <[email protected]>
AuthorDate: Wed Apr 9 14:20:06 2025 +0300
Add CVE-2025-30677
---
security/CVE-2025-30677.md | 35 +++++++++++++++++++++++++++++++++++
security/index.md | 7 +++++--
2 files changed, 40 insertions(+), 2 deletions(-)
diff --git a/security/CVE-2025-30677.md b/security/CVE-2025-30677.md
new file mode 100644
index 00000000000..93cf952a0fa
--- /dev/null
+++ b/security/CVE-2025-30677.md
@@ -0,0 +1,35 @@
+# CVE-2025-30677: Apache Pulsar IO Kafka Connector, Apache Pulsar IO Kafka
Connect Adaptor: Sensitive information logged in Pulsar's Apache Kafka
Connectors
+
+## Affected versions
+
+- Apache Pulsar IO Kafka Connector 2.3.0 before 3.0.11
+- Apache Pulsar IO Kafka Connector 3.1.0 before 3.3.6
+- Apache Pulsar IO Kafka Connector 4.0.0 before 4.0.4
+- Apache Pulsar IO Kafka Connect Adaptor 2.3.0 before 3.0.11
+- Apache Pulsar IO Kafka Connect Adaptor 3.1.0 before 3.3.6
+- Apache Pulsar IO Kafka Connect Adaptor 4.0.0 before 4.0.4
+
+## Description
+
+Apache Pulsar contains multiple connectors for integrating with Apache Kafka.
The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect
Adaptor Sink Connector log sensitive configuration properties in plain text in
application logs.
+
+This vulnerability can lead to unintended exposure of credentials in log
files, potentially allowing attackers with access to these logs to obtain
Apache Kafka credentials. The vulnerability's impact is limited by the fact
that an attacker would need access to the application logs to exploit this
issue.
+
+This issue affects Apache Pulsar IO's Apache Kafka connectors in all versions
before 3.0.11, 3.3.6, and 4.0.4.
+
+- 3.0.x version users should upgrade to at least 3.0.11.
+
+- 3.3.x version users should upgrade to at least 3.3.6.
+
+- 4.0.x version users should upgrade to at least 4.0.4.
+
+Users operating versions prior to those listed above should upgrade to the
aforementioned patched versions or newer versions.
+
+## Credit
+
+Kyler Katz (finder)
+
+## References
+
+- https://lists.apache.org/thread/zv5fwwrh374r1p5cmksxcd40ssxxko3d
+- https://www.cve.org/CVERecord?id=CVE-2025-30677
\ No newline at end of file
diff --git a/security/index.md b/security/index.md
index f932cee0ad0..56077b92242 100644
--- a/security/index.md
+++ b/security/index.md
@@ -13,6 +13,10 @@ It is the responsibility of the security vulnerability
handling project team (Ap
Please subscribe to the [[email protected] mailing
list](https://lists.apache.org/[email protected]) to receive
Apache Pulsar security advisories when they are published.
For instructions on how to subscribe, please see
https://pulsar.apache.org/contact/.
+### 2025
+
+* 2024-04-09 [CVE-2025-30677](CVE-2025-30677.md) Apache Pulsar IO Kafka
Connector, Apache Pulsar IO Kafka Connect Adaptor: Sensitive information logged
in Pulsar's Apache Kafka Connectors
+
### 2024
* 2024-10-04 [Apache Pulsar 3.3.2 released with important security fix for
CVE-2024-47561](https://lists.apache.org/thread/o7xg4odt1ms1g46f3mjn39bw5kq3hks0)
@@ -45,5 +49,4 @@ For instructions on how to subscribe, please see
https://pulsar.apache.org/conta
### 2021
-* 2021-05-25 [CVE-2021-22160](CVE-2021-22160.md) Authentication with JWT
allows use of "none"-algorithm
-
+* 2021-05-25 [CVE-2021-22160](CVE-2021-22160.md) Authentication with JWT
allows use of "none"-algorithm
\ No newline at end of file