The latest C++ client uses curl@7.85.0.

The CURLOPT_SSL_VERIFYPEER and CURLOPT_SSL_VERIFYHOST are enabled, and it
is strict.

https://curl.se/libcurl/c/CURLOPT_SSL_VERIFYHOST.html
https://curl.se/libcurl/c/CURLOPT_SSL_VERIFYPEER.html

Thanks,
Zixuan
Zixuan Liu <node...@gmail.com> 于2022年11月4日周五 11:28写道:

> Good catch, watching!
>
> Michael Marshall <mmarsh...@apache.org> 于2022年11月4日周五 02:51写道:
>
>> Severity: high
>>
>> Description:
>>
>> The Apache Pulsar C++ Client does not verify peer TLS certificates when
>> making HTTPS calls for the OAuth2.0 Client Credential Flow, even when
>> tlsAllowInsecureConnection is disabled via configuration. This
>> vulnerability allows an attacker to perform a man in the middle attack and
>> intercept and/or modify the GET request that is sent to the
>> ClientCredentialFlow 'issuer url'. The intercepted credentials can be used
>> to acquire authentication data from the OAuth2.0 server to then
>> authenticate with an Apache Pulsar cluster.
>>
>> An attacker can only take advantage of this vulnerability by taking
>> control of a machine 'between' the client and the server. The attacker must
>> then actively manipulate traffic to perform the attack.
>>
>> The Apache Pulsar Python Client wraps the C++ client, so it is also
>> vulnerable in the same way.
>>
>> This issue affects Apache Pulsar C++ Client and Python Client versions
>> 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0 to 2.10.1; 2.6.4 and
>> earlier.
>>
>> Mitigation:
>>
>> Any users running affected versions of the C++ Client or the Python
>> Client should rotate vulnerable OAuth2.0 credentials, including client_id
>> and client_secret.
>>
>> 2.7 C++ and Python Client users should upgrade to 2.7.5 and rotate
>> vulnerable OAuth2.0 credentials.
>> 2.8 C++ and Python Client users should upgrade to 2.8.4 and rotate
>> vulnerable OAuth2.0 credentials.
>> 2.9 C++ and Python Client users should upgrade to 2.9.3 and rotate
>> vulnerable OAuth2.0 credentials.
>> 2.10 C++ and Python Client users should upgrade to 2.10.2 and rotate
>> vulnerable OAuth2.0 credentials.
>> 3.0 C++ users are unaffected and 3.0 Python Client users will be
>> unaffected when it is released.
>> Any users running the C++ and Python Client for 2.6 or less should
>> upgrade to one of the above patched versions.
>>
>> Credit:
>>
>> This issue was discovered by Michael Rowley,
>> michaellrow...@protonmail.com
>>
>> References:
>>
>> https://lists.apache.org/thread/ky1ssskvkj00y36k7nys9b5gm5jjrzwv
>>
>

Reply via email to