Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN343

_____________________________________________________________________

DATE                : 10/06/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Kafka versions prior to
                                    3.9.1, 4.0.0.

=====================================================================
https://lists.apache.org/thread/ok29h7h0l5hwpoq9v4nlfngvzz71ndvs
https://lists.apache.org/thread/zc9v12hb4kt2twzxqmhn5t1psp38vbsn
https://lists.apache.org/thread/yj3dfb2yjx1gob3ppwkmxx79xktmfq0l
_____________________________________________________________________

CVE-2025-27817: Apache Kafka Client: Arbitrary file read and SSRF
vulnerability
Severity: important 

Affected versions:

- Apache Kafka Client 3.1.0 through 3.9.0

Description:

A possible arbitrary file read and SSRF vulnerability has been
identified in Apache Kafka Client. Apache Kafka Clients accept
configuration data for setting the SASL/OAUTHBEARER connection
with the brokers, including "sasl.oauthbearer.token.endpoint.url"
and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients
to read an arbitrary file and return the content in the error log,
or sending requests to an unintended location. In applications where
Apache Kafka Clients configurations can be specified by an untrusted
party, attackers may use the "sasl.oauthbearer.token.endpoint.url"
and "sasl.oauthbearer.jwks.endpoint.url" configuratin to read
arbitrary contents of the disk and environment variables or make
requests to an unintended location. In particular, this flaw may
be used in Apache Kafka Connect to escalate from REST API access
to filesystem/environment/URL access, which may be undesirable in
certain environments, including SaaS products. 

Since Apache Kafka 3.9.1/4.0.0, we have added a system property
("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the
allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all
urls by default for backward compatibility. However in 4.0.0 and
newer, the default value is empty list and users have to set the
allowed urls explicitly.


Credit:

罗鑫 <lx...@gmail.com> (finder)
1ue (https://github.com/luelueking) (finder)
4ra1n (https://github.com/4ra1n) (finder)
enokiy <84...@qq.com> (finder)
VulTeam of ThreatBook (finder)


References:

https://kafka.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-27817

_____________________________________________________________________

CVE-2025-27818: Apache Kafka: Possible RCE attack via SASL JAAS
LdapLoginModule configuration
Severity: important 

Affected versions:

- Apache Kafka 2.3.0 through 3.9.0

Description:

A possible security vulnerability has been identified in Apache
Kafka.
This requires access to a alterConfig to the cluster resource, or
Kafka Connect worker, and the ability to create/modify connectors on
it with an arbitrary Kafka client SASL JAAS config
and a SASL-based security protocol, which has been possible on Kafka
clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0).

When configuring the broker via config file or AlterConfig command,
or connector via the Kafka Kafka Connect REST API, an authenticated
operator can set the `sasl.jaas.config`
property for any of the connector's Kafka clients to
"com.sun.security.auth.module.LdapLoginModule", which can be done
via the
`producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`,
or `admin.override.sasl.jaas.config` properties.

This will allow the server to connect to the attacker's LDAP server
and deserialize the LDAP response, which the attacker can use to
execute java deserialization gadget chains on the Kafka connect server.
Attacker can cause unrestricted deserialization of untrusted data (or)
RCE vulnerability when there are gadgets in the classpath.

Since Apache Kafka 3.0.0, users are allowed to specify these
properties in connector configurations for Kafka Connect clusters
running with out-of-the-box configurations. Before Apache Kafka 3.0.0,
users may not specify these properties unless the Kafka Connect
cluster has been reconfigured with a connector
client override policy that permits them.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property
("-Dorg.apache.kafka.disallowed.login.modules") to disable the
problematic login modules usage
in SASL JAAS configuration. Also by default
"com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule"
are disabled in Apache Kafka Connect 3.9.1/4.0.0. 

We advise the Kafka users to validate connector configurations
and only allow trusted LDAP configurations. Also examine connector
dependencies for vulnerable versions and either upgrade their
connectors, upgrading that specific dependency, or removing the
connectors as options for remediation. Finally, in addition to
leveraging the "org.apache.kafka.disallowed.login.modules" system
property, Kafka Connect users can also implement their own
connector client config override policy, which can be used to
control which Kafka client properties can be overridden directly
in a connector config and which cannot.


Credit:

罗鑫 <lx...@gmail.com> (finder)
ra1lgun <ra...@foxmail.com> (finder)

References:

https://kafka.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-27818

_____________________________________________________________________

CVE-2025-27819: Apache Kafka: Possible RCE/Denial of service attack
via SASL JAAS JndiLoginModule configuration
Severity: important 

Affected versions:

- Apache Kafka 2.0.0 through 3.3.2

Description:

In CVE-2023-25194, we announced the RCE/Denial of service attack via
SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not
only Kafka Connect API is vulnerable to this attack, the Apache Kafka
brokers also have this vulnerability. To exploit this vulnerability,
the attacker needs to be able to connect to the Kafka cluster and have
the AlterConfigs permission on the cluster resource.


Since Apache Kafka 3.4.0, we have added a system property
("-Dorg.apache.kafka.disallowed.login.modules") to disable the
problematic login modules usage in SASL JAAS configuration. Also by
default "com.sun.security.auth.module.JndiLoginModule" is disabled
in Apache Kafka 3.4.0, and
"com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule"
is disabled by default in in Apache Kafka 3.9.1/4.0.0


Credit:

Ziyang Li (finder)
Ji'an Zhou (finder)
Ying Zhu (finder)


References:

https://kafka.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-27819

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
