4.0.1
7 years ago
15 days ago
Known vulnerabilities in the org.apache.pulsar:pulsar-broker package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Authorization in namespace and topic management endpoints. An attacker with produce or consume permissions can perform unauthorized operations on partitioned topics, such as unloading topics and triggering compaction, which should be restricted to users with the tenant admin role or superuser role. Note: The vulnerability allows an authenticated user to read, create, modify, and delete namespace properties in any namespace in any tenant. In Pulsar, namespace properties are reserved for user provided metadata about the namespace. How to fix Improper Authorization? Upgrade | [2.7.1,3.0.4)[3.1.0,3.2.2) |
Affected versions of this package are vulnerable to Improper Authorization on topic-level policy management. An attacker can bypass access restrictions and modify topic-level policies without proper permissions. How to fix Improper Authorization? Upgrade | [2.7.1,2.10.6)[2.11.0,2.11.4)[3.0.0,3.0.3)[3.1.0,3.1.3)[3.2.0,3.2.1) |
Affected versions of this package are vulnerable to Improper Input Validation allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. Note This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". How to fix Improper Input Validation? Upgrade | [2.4.0,2.10.6)[2.11.0,2.11.4)[3.0.0,3.0.3)[3.1.0,3.1.3)[3.2.0,3.2.1) |
Affected versions of this package are vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') due to improper validation of filenames in uploaded jar or nar files, which are essentially zip files. An attacker can create or modify files outside of the designated extraction directory, potentially influencing system behavior by uploading a malicious file that exploits directory traversal with special elements like Note: This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". How to fix Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')? Upgrade | [2.4.0,2.10.6)[2.11.0,2.11.4)[3.0.0,3.0.3)[3.1.0,3.1.3)[3.2.0,3.2.1) |
Affected versions of this package are vulnerable to Improper Access Control due to the capability that permits authenticated users to create functions where the function's implementation is referenced by a URL, including schemes like Note: This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". How to fix Improper Access Control? Upgrade | [2.4.0,2.10.6)[2.11.0,2.11.4)[3.0.0,3.0.3)[3.1.0,3.1.3)[3.2.0,3.2.1) |