Apache

Pulsar

20 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 09.04.2025 11:58:11
  • Last modified 15.07.2025 19:15:05

Apache Pulsar contains multiple connectors for integrating with Apache Kafka. The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect Adaptor Sink Connector log sensitive configuration properties in plain text in application lo...

  • EPSS 0.17%
  • Published 02.04.2024 20:15:09
  • Last modified 24.01.2025 16:21:24

This vulnerability allows authenticated users with produce or consume permissions to perform unauthorized operations on partitioned topics, such as unloading topics and triggering compaction. These management operations should be restricted to users ...

  • EPSS 0.13%
  • Published 12.03.2024 19:15:48
  • Last modified 13.02.2025 18:17:46

The vulnerability allows authenticated users with only produce or consume permissions to modify topic-level policies, such as retention, TTL, and offloading settings. These management operations should be restricted to users with the tenant admin rol...

  • EPSS 0.32%
  • Published 12.03.2024 19:15:47
  • Last modified 19.01.2025 03:09:08

The Pulsar Functions Worker includes a capability that permits authenticated users to create functions where the function's implementation is referenced by a URL. The supported URL schemes include "file", "http", and "https". When a function is creat...

  • EPSS 1.07%
  • Published 12.03.2024 19:15:47
  • Last modified 19.01.2025 03:23:26

In Pulsar Functions Worker, authenticated users can upload functions in jar or nar files. These files, essentially zip files, are extracted by the Functions Worker. However, if a malicious file is uploaded, it could exploit a directory traversal vuln...

  • EPSS 0.12%
  • Published 12.03.2024 19:15:47
  • Last modified 13.02.2025 18:17:19

Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability al...

  • EPSS 0.05%
  • Published 12.03.2024 19:15:47
  • Last modified 22.01.2025 17:59:49

Improper Authentication vulnerability in Apache Pulsar Proxy allows an attacker to connect to the /proxy-stats endpoint without authentication. The vulnerable endpoint exposes detailed statistics about live connections, along with the capability to m...

  • EPSS 0.1%
  • Published 07.02.2024 10:15:08
  • Last modified 21.11.2024 08:38:06

Observable timing discrepancy vulnerability in Apache Pulsar SASL Authentication Provider can allow an attacker to forge a SASL Role Token that will pass signature verification. Users are recommended to upgrade to version 2.11.3, 3.0.2, or 3.1.1 whic...

  • EPSS 0.05%
  • Published 20.12.2023 09:15:07
  • Last modified 21.11.2024 08:11:54

Improper Authentication vulnerability in Apache Pulsar WebSocket Proxy allows an attacker to connect to the /pingpong endpoint without authentication. This issue affects Apache Pulsar WebSocket Proxy: from 2.8.0 through 2.8.*, from 2.9.0 through 2.9...

  • EPSS 0.09%
  • Published 12.07.2023 10:15:11
  • Last modified 21.11.2024 08:11:59

Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Function Worker. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. Any authenticated user can retrieve a source's configuration or a sink's configuration w...