Timing Attack Affecting org.apache.kafka:connect-runtime package, versions [2.8.0,2.8.1) [,2.7.2)


0.0
medium
  • Attack Complexity

    High

  • Scope

    Changed

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEKAFKA-1540736

  • published

    21 Sep 2021

  • disclosed

    13 Aug 2021

  • credit

    Jonathan Santilli of Snyk Security Team

How to fix?

Upgrade org.apache.kafka:connect-runtime to version 2.8.1, 2.7.2 or higher.

Overview

Affected versions of this package are vulnerable to Timing Attack. Some components in Apache Kafka use Arrays.equals to validate a password or key, which is vulnerable to brute force attacks by malicious users.