Vulnerabilities > Apache > Pulsar > Medium

DATE CVE VULNERABILITY TITLE RISK
2024-04-02 CVE-2024-29834 Unspecified vulnerability in Apache Pulsar
This vulnerability allows authenticated users with produce or consume permissions to perform unauthorized operations on partitioned topics, such as unloading topics and triggering compaction.
network
low complexity
apache
6.4
2024-03-12 CVE-2024-28098 Unspecified vulnerability in Apache Pulsar
The vulnerability allows authenticated users with only produce or consume permissions to modify topic-level policies, such as retention, TTL, and offloading settings.
network
low complexity
apache
5.4
2023-07-12 CVE-2023-31007 Unspecified vulnerability in Apache Pulsar
Improper Authentication vulnerability in Apache Software Foundation Apache Pulsar Broker allows a client to stay connected to a broker after authentication data expires if the client connected through the Pulsar Proxy when the broker is configured with authenticateOriginalAuthData=false or if a client connects directly to a broker with a specially crafted connect command when the broker is configured with authenticateOriginalAuthData=false. This issue affects Apache Pulsar: through 2.9.4, from 2.10.0 through 2.10.3, 2.11.0. 2.9 Pulsar Broker users should upgrade to at least 2.9.5. 2.10 Pulsar Broker users should upgrade to at least 2.10.4. 2.11 Pulsar Broker users should upgrade to at least 2.11.1. 3.0 Pulsar Broker users are unaffected. Any users running the Pulsar Broker for 2.8.* and earlier should upgrade to one of the above patched versions.
network
low complexity
apache
6.5
2023-07-12 CVE-2023-37579 Unspecified vulnerability in Apache Pulsar
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar Function Worker. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. Any authenticated user can retrieve a source's configuration or a sink's configuration without authorization.
network
low complexity
apache
6.5
2022-09-23 CVE-2022-24280 Improper Input Validation vulnerability in Apache Pulsar
Improper Input Validation vulnerability in Proxy component of Apache Pulsar allows an attacker to make TCP/IP connection attempts that originate from the Pulsar Proxy's IP address.
network
low complexity
apache CWE-20
6.5
2022-09-23 CVE-2022-33681 Improper Certificate Validation vulnerability in Apache Pulsar
Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack.
network
high complexity
apache CWE-295
5.9
2022-09-23 CVE-2022-33682 Improper Certificate Validation vulnerability in Apache Pulsar
TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle attacks, which could leak credentials, configuration data, message data, and any other data sent by these clients.
network
high complexity
apache CWE-295
5.9
2022-09-23 CVE-2022-33683 Improper Certificate Validation vulnerability in Apache Pulsar
Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration.
network
high complexity
apache CWE-295
5.9
2022-02-01 CVE-2021-41571 Unspecified vulnerability in Apache Pulsar
In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user.
network
low complexity
apache
6.5