Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2024-31141 (Medium) detected in kafka-clients-3.7.1.jar - autoclosed #4934

Closed
1 task
mend-for-github-com bot opened this issue Nov 25, 2024 · 2 comments
Closed
1 task
Assignees
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource triaged Issues labeled as 'Triaged' have been reviewed and are deemed actionable.

Comments

@mend-for-github-com
Copy link
Contributor

CVE-2024-31141 - Medium Severity Vulnerability

Vulnerable Library - kafka-clients-3.7.1.jar

Library home page: https://kafka.apache.org

Path to dependency file: /build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.kafka/kafka-clients/3.7.1/75a75c47eb912f3fd06df62a9e4b3b554d5b2bec/kafka-clients-3.7.1.jar

Dependency Hierarchy:

  • kafka-clients-3.7.1.jar (Vulnerable Library)

Found in HEAD commit: 59a01ddb2306b37c2b8dd0f333258d4e417d63c9

Found in base branch: main

Vulnerability Details

Files or Directories Accessible to External Parties, Improper Privilege Management vulnerability in Apache Kafka Clients. Apache Kafka Clients accept configuration data for customizing behavior, and includes ConfigProvider plugins in order to manipulate these configurations. Apache Kafka also provides FileConfigProvider, DirectoryConfigProvider, and EnvVarConfigProvider implementations which include the ability to read from disk or environment variables. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use these ConfigProviders to read arbitrary contents of the disk and environment variables. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment access, which may be undesirable in certain environments, including SaaS products. This issue affects Apache Kafka Clients: from 2.3.0 through 3.5.2, 3.6.2, 3.7.0. Users with affected applications are recommended to upgrade kafka-clients to version >=3.8.0, and set the JVM system property "org.apache.kafka.automatic.config.providers=none". Users of Kafka Connect with one of the listed ConfigProvider implementations specified in their worker config are also recommended to add appropriate "allowlist.pattern" and "allowed.paths" to restrict their operation to appropriate bounds. For users of Kafka Clients or Kafka Connect in environments that trust users with disk and environment variable access, it is not recommended to set the system property. For users of the Kafka Broker, Kafka MirrorMaker 2.0, Kafka Streams, and Kafka command-line tools, it is not recommended to set the system property.

Publish Date: 2024-11-19

URL: CVE-2024-31141

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://seclists.org/oss-sec/2024/q4/106

Release Date: 2024-11-19

Fix Resolution: 3.8.0


  • Check this box to open an automated fix PR
@mend-for-github-com mend-for-github-com bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Nov 25, 2024
@github-actions github-actions bot added the untriaged Require the attention of the repository maintainers and may need to be prioritized label Nov 25, 2024
@cwperks cwperks self-assigned this Nov 25, 2024
@cwperks cwperks added triaged Issues labeled as 'Triaged' have been reviewed and are deemed actionable. and removed untriaged Require the attention of the repository maintainers and may need to be prioritized labels Nov 25, 2024
@cwperks
Copy link
Member

cwperks commented Nov 25, 2024

[Triage] I will take a look to see if this can be upgraded.

@mend-for-github-com mend-for-github-com bot changed the title CVE-2024-31141 (Medium) detected in kafka-clients-3.7.1.jar CVE-2024-31141 (Medium) detected in kafka-clients-3.7.1.jar - autoclosed Dec 2, 2024
Copy link
Contributor Author

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource triaged Issues labeled as 'Triaged' have been reviewed and are deemed actionable.
Projects
None yet
Development

No branches or pull requests

1 participant