Hide Forgot
Apache Kafka before versions 0.10.2.2, 0.11.0.2 and 1.0.0 allow clients to impersonate users via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations. External Reference: https://lists.apache.org/thread.html/b6157be1a09df332294213bd21e90dcf9fe4c1810193be54620e4210@%3Cusers.kafka.apache.org%3E Upstream Patches: https://github.com/apache/kafka/commit/9f3468645b968761ca9141d18337cb6adadbae97 https://github.com/apache/kafka/commit/0b4daa4bf48517b4b3e9cda11692e80ade620b04 https://github.com/apache/kafka/commit/47c2753496875db2849065ad91ee03c7c842c8e9
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-12610