Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-34917 (High) detected in kafka-clients-3.0.1.jar - autoclosed #2095

Closed
1 task
mend-for-github.aaakk.us.kg bot opened this issue Sep 20, 2022 · 1 comment
Closed
1 task
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-for-github.aaakk.us.kg
Copy link
Contributor

mend-for-github.aaakk.us.kg bot commented Sep 20, 2022

CVE-2022-34917 - High Severity Vulnerability

Vulnerable Library - kafka-clients-3.0.1.jar

Library home page: https://kafka.apache.org

Path to dependency file: /build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.kafka/kafka-clients/3.0.1/8f931e45e96e952728d540829e5bde9d79fab172/kafka-clients-3.0.1.jar,/radle/caches/modules-2/files-2.1/org.apache.kafka/kafka-clients/3.0.1/8f931e45e96e952728d540829e5bde9d79fab172/kafka-clients-3.0.1.jar

Dependency Hierarchy:

  • kafka-clients-3.0.1.jar (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions.

Publish Date: 2022-09-20

URL: CVE-2022-34917

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34917

Release Date: 2022-09-20

Fix Resolution: 3.0.2


  • Check this box to open an automated fix PR
@mend-for-github.aaakk.us.kg mend-for-github.aaakk.us.kg bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Sep 20, 2022
@mend-for-github.aaakk.us.kg mend-for-github.aaakk.us.kg bot changed the title CVE-2022-34917 (Medium) detected in kafka-clients-3.0.1.jar CVE-2022-34917 (High) detected in kafka-clients-3.0.1.jar Sep 23, 2022
vinayak15 added a commit to vinayak15/security that referenced this issue Sep 29, 2022
vinayak15 added a commit to vinayak15/security that referenced this issue Sep 29, 2022
@mend-for-github.aaakk.us.kg mend-for-github.aaakk.us.kg bot changed the title CVE-2022-34917 (High) detected in kafka-clients-3.0.1.jar CVE-2022-34917 (High) detected in kafka-clients-3.0.1.jar - autoclosed Sep 29, 2022
@mend-for-github.aaakk.us.kg
Copy link
Contributor Author

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants