CVE-2024-27135

Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.6. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.4. 3.0 Pulsar Function Worker users should upgrade to at least 3.0.3. 3.1 Pulsar Function Worker users should upgrade to at least 3.1.3. 3.2 Pulsar Function Worker users should upgrade to at least 3.2.1. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:pulsar:3.2.0:-:*:*:*:*:*:*

History

13 Feb 2025, 18:17

Type Values Removed Values Added
Summary (en) Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.6. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.4. 3.0 Pulsar Function Worker users should upgrade to at least 3.0.3. 3.1 Pulsar Function Worker users should upgrade to at least 3.1.3. 3.2 Pulsar Function Worker users should upgrade to at least 3.2.1. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions. (en) Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.6. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.4. 3.0 Pulsar Function Worker users should upgrade to at least 3.0.3. 3.1 Pulsar Function Worker users should upgrade to at least 3.1.3. 3.2 Pulsar Function Worker users should upgrade to at least 3.2.1. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.

22 Jan 2025, 21:07

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/03/12/9 - () http://www.openwall.com/lists/oss-security/2024/03/12/9 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/dh8nj2vmb2br6thjltq74lk9jxkz62wn - () https://lists.apache.org/thread/dh8nj2vmb2br6thjltq74lk9jxkz62wn - Vendor Advisory
References () https://pulsar.apache.org/security/CVE-2024-27135/ - () https://pulsar.apache.org/security/CVE-2024-27135/ - Vendor Advisory
First Time Apache
Apache pulsar
CPE cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:pulsar:3.2.0:-:*:*:*:*:*:*

Information

Published : 2024-03-12 19:15

Updated : 2025-02-13 18:17


NVD link : CVE-2024-27135

Mitre link : CVE-2024-27135

CVE.ORG link : CVE-2024-27135


JSON object : View

Products Affected

apache

  • pulsar
CWE
CWE-20

Improper Input Validation

CWE-913

Improper Control of Dynamically-Managed Code Resources