-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.kafka:kafka-clients | maven | >= 0.10.0.0, <= 0.10.2.1 | 0.10.2.2 |
| org.apache.kafka:kafka-clients | maven | >= 0.11.0.0, <= 0.11.0.1 | 0.11.0.2 |
The vulnerability stems from improper validation in SASL/PLAIN and SASL/SCRAM authentication handlers. Key functions identified are:
These functions are in the authentication flow where client-provided usernames could be accepted without proper validation against the authenticated credentials, enabling impersonation. The confidence is high for the direct authentication handlers (SCRAM/PLAIN) and medium for the SaslServerAuthenticator which manages the overall process.
A Semantic Attack on Google Gemini - Read the Latest Research