Incorrect Authorization Affecting kafka-jre-bcfips package, versions <3.7.0-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-KAFKAJREBCFIPS-6809033
  • published6 May 2024
  • disclosed12 Apr 2024

Introduced: 12 Apr 2024

CVE-2024-27309  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade Chainguard kafka-jre-bcfips to version 3.7.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kafka-jre-bcfips package and not the kafka-jre-bcfips package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

While an Apache Kafka cluster is being migrated from ZooKeeper mode to KRaft mode, in some cases ACLs will not be correctly enforced.

Two preconditions are needed to trigger the bug:

  1. The administrator decides to remove an ACL
  2. The resource associated with the removed ACL continues to have two or more other ACLs associated with it after the removal.

When those two preconditions are met, Kafka will treat the resource as if it had only one ACL associated with it after the removal, rather than the two or more that would be correct.

The incorrect condition is cleared by removing all brokers in ZK mode, or by adding a new ACL to the affected resource. Once the migration is completed, there is no metadata loss (the ACLs all remain).

The full impact depends on the ACLs in use. If only ALLOW ACLs were configured during the migration, the impact would be limited to availability impact. if DENY ACLs were configured, the impact could include confidentiality and integrity impact depending on the ACLs configured, as the DENY ACLs might be ignored due to this vulnerability during the migration period.