
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN293
_____________________________________________________________________

DATE                : 28/05/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Pulsar versions prior to
                                           2.7.1.

=====================================================================
http://mail-archives.apache.org/mod_mbox/pulsar-users/202105.mbox/%3cCAJVHGGyGbp9XSEp_3UscS+gLChBABEq0gotJFEK-sfbjG1Zdxg@mail.gmail.com%3e
_____________________________________________________________________

CVE-2021-22160 Apache Pulsar Information Disclosure

Severity: High

Versions Affected:
Apache Pulsar < 2.7.1


Description:
If Apache Pulsar is configured to authenticate clients using tokens
based on JSON Web Tokens (JWT), the signature of the token is not
validated if the algorithm of the presented token is set to "none".
This allows an attacker to connect to Pulsar instances as any user
(incl. admins).


Mitigation:
Users of the affected versions should apply one of the following
mitigations:
Upgrade to Apache Pulsar 2.7.1 or later


Credit:
This issue was identified by Peter Stöckli

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



