Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-37544
Analyzed
More InfoOfficial Page
Source-security@apache.org
View Known Exploited Vulnerability (KEV) details
Published At-20 Dec, 2023 | 09:15
Updated At-04 Jan, 2024 | 18:52

Improper Authentication vulnerability in Apache Pulsar WebSocket Proxy allows an attacker to connect to the /pingpong endpoint without authentication. This issue affects Apache Pulsar WebSocket Proxy: from 2.8.0 through 2.8.*, from 2.9.0 through 2.9.*, from 2.10.0 through 2.10.4, from 2.11.0 through 2.11.1, 3.0.0. The known risks include a denial of service due to the WebSocket Proxy accepting any connections, and excessive data transfer due to misuse of the WebSocket ping/pong feature. 2.10 Pulsar WebSocket Proxy users should upgrade to at least 2.10.5. 2.11 Pulsar WebSocket Proxy users should upgrade to at least 2.11.2. 3.0 Pulsar WebSocket Proxy users should upgrade to at least 3.0.1. 3.1 Pulsar WebSocket Proxy users are unaffected. Any users running the Pulsar WebSocket Proxy for 2.8, 2.9, and earlier should upgrade to one of the above patched versions.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

The Apache Software Foundation
apache
>>pulsar>>Versions before 2.10.5(exclusive)
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>pulsar>>Versions from 2.11.0(inclusive) to 2.11.2(exclusive)
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>pulsar>>3.0.0
cpe:2.3:a:apache:pulsar:3.0.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarysecurity@apache.org
CWE ID: CWE-287
Type: Primary
Source: security@apache.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2023/12/20/2security@apache.org
Mailing List
https://lists.apache.org/thread/od0k9zts1toc9h9snbqq4pjpyx28mv4msecurity@apache.org
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2023/12/20/2
Source: security@apache.org
Resource:
Mailing List
Hyperlink: https://lists.apache.org/thread/od0k9zts1toc9h9snbqq4pjpyx28mv4m
Source: security@apache.org
Resource:
Mailing List
Change History
0Changes found

Details not found