Incorrect access control in the Kafka Connect REST API in the STRIMZI Project 0.41.0 and earlier allows an attacker to deny the service for Kafka Mirroring, potentially mirror the topics' content to his Kafka cluster via a malicious connector (bypassing Kafka ACL if it exists), and potentially steal Kafka SASL credentials, by querying the MirrorMaker Kafka REST API.
References
Configurations
No configuration.
History
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://strimzi.com - | |
References | () https://github.com/almounah/vulnerability-research/tree/main/CVE-2024-36543 - |
03 Jul 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-400 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
20 Jun 2024, 12:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Jun 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-17 19:15
Updated : 2024-11-21 09:22
NVD link : CVE-2024-36543
Mitre link : CVE-2024-36543
CVE.ORG link : CVE-2024-36543
JSON object : View
Products Affected
No product.
CWE
CWE-400
Uncontrolled Resource Consumption