漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Karapace is vulnerable to Authentication Bypass
Vulnerability Description
Karapace is an open-source implementation of Kafka REST and Schema Registry. Versions 5.0.0 and 5.0.1 contain an authentication bypass vulnerability when configured to use OAuth 2.0 Bearer Token authentication. If a request is sent without an Authorization header, the token validation logic is skipped entirely, allowing an unauthenticated user to read and write to Schema Registry endpoints that should otherwise be protected. This effectively renders the OAuth authentication mechanism ineffective. This issue is fixed in version 5.0.2.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
Vulnerability Type
关键功能的认证机制缺失
Vulnerability Title
Karapace 访问控制错误漏洞
Vulnerability Description
karapace是Aiven Open开源的一个消息队列工具。 Karapace 5.0.0版本和5.0.1版本存在访问控制错误漏洞,该漏洞源于请求缺少Authorization标头时跳过令牌验证逻辑,可能导致未经验证的用户读取和写入Schema Registry端点。
CVSS Information
N/A
Vulnerability Type
N/A