Bug 2299212 (CVE-2024-23321)
Summary: | CVE-2024-23321 apache: RocketMQ: org.apache.rocketmq:rocketmq-all: Unauthorized Exposure of Sensitive Data | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | fmariani, gmalinko, janstey, jpoth, pjindal, rstepani, tcunning, yfang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in Apache RocketMQ, where there is a risk of exposure of sensitive Information to an unauthorized actor even if RocketMQ is enabled with authentication and authorization functions. This flaw allows an attacker, possessing regular user privileges or listed in the IP whitelist, to potentially acquire the administrator's account and password through specific interfaces. This action would grant them full control over RocketMQ, provided they can access the broker IP address list.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
OSIDB Bzimport
2024-07-22 10:21:04 UTC
|