Good catch, watching!

Michael Marshall <mmarsh...@apache.org> 于2022年11月4日周五 02:51写道:

> Severity: high
>
> Description:
>
> The Apache Pulsar C++ Client does not verify peer TLS certificates when
> making HTTPS calls for the OAuth2.0 Client Credential Flow, even when
> tlsAllowInsecureConnection is disabled via configuration. This
> vulnerability allows an attacker to perform a man in the middle attack and
> intercept and/or modify the GET request that is sent to the
> ClientCredentialFlow 'issuer url'. The intercepted credentials can be used
> to acquire authentication data from the OAuth2.0 server to then
> authenticate with an Apache Pulsar cluster.
>
> An attacker can only take advantage of this vulnerability by taking
> control of a machine 'between' the client and the server. The attacker must
> then actively manipulate traffic to perform the attack.
>
> The Apache Pulsar Python Client wraps the C++ client, so it is also
> vulnerable in the same way.
>
> This issue affects Apache Pulsar C++ Client and Python Client versions
> 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0 to 2.10.1; 2.6.4 and
> earlier.
>
> Mitigation:
>
> Any users running affected versions of the C++ Client or the Python Client
> should rotate vulnerable OAuth2.0 credentials, including client_id and
> client_secret.
>
> 2.7 C++ and Python Client users should upgrade to 2.7.5 and rotate
> vulnerable OAuth2.0 credentials.
> 2.8 C++ and Python Client users should upgrade to 2.8.4 and rotate
> vulnerable OAuth2.0 credentials.
> 2.9 C++ and Python Client users should upgrade to 2.9.3 and rotate
> vulnerable OAuth2.0 credentials.
> 2.10 C++ and Python Client users should upgrade to 2.10.2 and rotate
> vulnerable OAuth2.0 credentials.
> 3.0 C++ users are unaffected and 3.0 Python Client users will be
> unaffected when it is released.
> Any users running the C++ and Python Client for 2.6 or less should upgrade
> to one of the above patched versions.
>
> Credit:
>
> This issue was discovered by Michael Rowley, michaellrow...@protonmail.com
>
> References:
>
> https://lists.apache.org/thread/ky1ssskvkj00y36k7nys9b5gm5jjrzwv
>

Reply via email to