Authentication Bypass Affecting org.apache.pulsar:pulsar-broker-common Open this link in a new tab package, versions [0, 2.7.1)


0.0
medium
  • Attack Complexity

    High

  • Scope

    Changed

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEPULSAR-1297105

  • published

    27 May 2021

  • disclosed

    27 May 2021

  • credit

    Peter Stöckli

How to fix?

Upgrade org.apache.pulsar:pulsar-broker-common to version 2.7.1 or higher.

Overview

Affected versions of this package are vulnerable to Authentication Bypass. If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).