CVE-2017-12610

Impact:
Moderate
Public Date:
2018-07-26
CWE:
CWE-290
Bugzilla:
1611049: CVE-2017-12610 kafka: Clients authenticated with SASL/PLAIN or SASL/SCRAM can impersonate other users

The MITRE CVE dictionary describes this issue as:

In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka.

Find out more about CVE-2017-12610 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.4
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact None

Affected Packages State

Platform Package State
Red Hat OpenShift Application Runtimes 1.0 vertx Under investigation
Red Hat Mobile Application Platform On-Premise 4 kafka Not affected
Red Hat JBoss Fuse 7 kafka Not affected
Red Hat JBoss Fuse 6 kafka Will not fix

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.