CVE-2024-27135

Severity
9.9CRITICAL
EPSS
0.1%
top 74.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 12

Description

Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0. 2.10 Pulsar Functi

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0

Affected Packages3 packages

NVDapache/pulsar2.4.02.10.6+4
CVEListV5apache_software_foundation/apache_pulsar2.4.02.10.6+4

🔴Vulnerability Details

3
OSV
Apache Pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution2024-03-12
CVEList
Apache Pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution2024-03-12
GHSA
Apache Pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution2024-03-12

📋Vendor Advisories

1
Red Hat
apache-pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution2024-03-12