Bug 2136207 (CVE-2022-33681) - CVE-2022-33681 Apache Pulsar: Improper Hostname Verification in Java Client and Proxy can expose authentication data via MITM
Summary: CVE-2022-33681 Apache Pulsar: Improper Hostname Verification in Java Client a...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-33681
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2129377
TreeView+ depends on / blocked
 
Reported: 2022-10-19 15:16 UTC by Patrick Del Bello
Modified: 2023-05-03 19:12 UTC (History)
17 users (show)

Fixed In Version: pulsar-client 2.7.5, pulsar-client 2.8.4, pulsar-client 2.9.3, pulsar-client 2.10.1
Doc Type: ---
Doc Text:
A flaw was found in the Apache Pulsar Java Client. This flaw allows an attacker to use a Man-in-the-Middle (MITM) attack, manipulating network traffic and gaining the client's authentication data.
Clone Of:
Environment:
Last Closed: 2023-05-03 19:12:58 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:2100 0 None None None 2023-05-03 14:06:25 UTC

Description Patrick Del Bello 2022-10-19 15:16:41 UTC
Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to the Pulsar Broker are vulnerable. Authentication data is sent before verifying the server’s TLS certificate matches the hostname, which means authentication data could be exposed to an attacker. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. Because the client sends authentication data before performing hostname verification, an attacker could gain access to the client’s authentication data. The client eventually closes the connection when it verifies the hostname and identifies the targeted hostname does not match a hostname on the certificate. Because the client eventually closes the connection, the value of the intercepted authentication data depends on the authentication method used by the client. Token based authentication and username/password authentication methods are vulnerable because the authentication data can be used to impersonate the client in a separate session. This issue affects Apache Pulsar Java Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.

https://lists.apache.org/thread/fpo6x10trvn20hlk0dmnr5vlz5v4kl3d

Comment 2 errata-xmlrpc 2023-05-03 14:06:24 UTC
This issue has been addressed in the following products:

  RHINT Camel-Springboot 3.20.1

Via RHSA-2023:2100 https://access.redhat.com/errata/RHSA-2023:2100

Comment 3 Product Security DevOps Team 2023-05-03 19:12:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-33681


Note You need to log in before you can comment on or make changes to this bug.