Information Exposure Affecting org.apache.pulsar:pulsar-broker-auth-sasl package, versions [,2.11.3)[3.0.0,3.0.2)[3.1.0,3.1.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHEPULSAR-6231830
  • published8 Feb 2024
  • disclosed7 Feb 2024
  • creditYiheng Cao, Chenhao Lu, Kaifeng Huang

Introduced: 7 Feb 2024

CVE-2023-51437  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.apache.pulsar:pulsar-broker-auth-sasl to version 2.11.3, 3.0.2, 3.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure due to an observable timing discrepancy in the SASL Authentication Provider. An attacker can forge a SASL Role Token that will pass signature verification by exploiting this timing discrepancy.

Note: Any component running the SASL Authentication Provider is affected, including the Pulsar Broker, Proxy, Websocket Proxy or Function Worker.

Workaround

Update the configured secret in the saslJaasServerRoleTokenSignerSecretPath file.

CVSS Base Scores

version 3.1