First published: Thu Jul 26 2018(Updated: )
In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kafka | >=0.10.0.0<=0.10.2.1 | |
Apache Kafka | >=0.11.0.0<=0.11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12610 is a vulnerability in Apache Kafka where authenticated clients can use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations.
CVE-2017-12610 allows authenticated Kafka clients to impersonate other users.
The severity of CVE-2017-12610 is medium with a CVSS score of 6.8.
Apache Kafka versions 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1 are affected by CVE-2017-12610.
To fix CVE-2017-12610, upgrade Apache Kafka to a version that is not affected by the vulnerability.