ID:9725 - Exploit for Deserialization of Untrusted Data in Apache Kafka - CVE-2023-25194

 
Main Vulnerability Database Exploits ID:9725 - Exploit for Deserialization of Untrusted Data in Apache Kafka - CVE-2023-25194

ID:9725 - Exploit for Deserialization of Untrusted Data in Apache Kafka - CVE-2023-25194

Published: April 19, 2024


Vulnerability identifier: #VU72123
Vulnerability risk: Low
CVE-ID: CVE-2023-25194
CWE-ID: CWE-502
Exploitation vector: Remote access
Vulnerable software:
Apache Kafka

Link to public exploit:


Vulnerability description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to Apache Kafka Connect performs deserialization of data retrieved from the configured LDAP server in "com.sun.security.auth.module.JndiLoginModule". A remote user ability to create/modify connectors on the server with an arbitrary Kafka client SASL JAAS config can configure the server to connect to a malicious LDAP server and execute arbitrary Java code on the system.


Remediation

Install updates from vendor's website, which disables the problematic login modules usage in SASL JAAS configuration.

It is also recommended to validate connector configurations and only allow trusted JNDI configurations.