Apache

Pulsar

20 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 12.07.2023 10:15:10
  • Last modified 21.11.2024 08:01:13

Improper Authentication vulnerability in Apache Software Foundation Apache Pulsar Broker allows a client to stay connected to a broker after authentication data expires if the client connected through the Pulsar Proxy when the broker is configured wi...

  • EPSS 0.07%
  • Published 12.07.2023 10:15:09
  • Last modified 21.11.2024 08:00:10

Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mT...

  • EPSS 0.1%
  • Published 12.07.2023 10:15:09
  • Last modified 21.11.2024 08:00:09

Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Broker's Rest Producer allows authenticated user with a custom HTTP header to produce a message to any topic using the broker's admin role. This issue affects Apache Pu...

Exploit
  • EPSS 0.16%
  • Published 04.11.2022 12:15:13
  • Last modified 02.05.2025 19:15:50

The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a...

  • EPSS 0.22%
  • Published 23.09.2022 10:15:10
  • Last modified 22.05.2025 19:15:33

Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS...

  • EPSS 0.28%
  • Published 23.09.2022 10:15:10
  • Last modified 27.05.2025 15:15:25

TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication...

  • EPSS 0.07%
  • Published 23.09.2022 10:15:10
  • Last modified 22.05.2025 21:15:23

Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to th...

  • EPSS 0.22%
  • Published 23.09.2022 10:15:10
  • Last modified 22.05.2025 21:15:20

Improper Input Validation vulnerability in Proxy component of Apache Pulsar allows an attacker to make TCP/IP connection attempts that originate from the Pulsar Proxy's IP address. When the Apache Pulsar Proxy component is used, it is possible to att...

Exploit
  • EPSS 0.98%
  • Published 01.02.2022 13:15:09
  • Last modified 21.11.2024 06:26:27

In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to ...

  • EPSS 18.53%
  • Published 26.05.2021 13:15:07
  • Last modified 21.11.2024 05:49:37

If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar ins...