About the Vulnerability

Introduction

Apache Kafka UI is a graphical user interface that allows users to visualize and manage topics, producers, consumers, and other resources in an Apache Kafka cluster.

Summary

On June 25, 2024, Sangfor FarSight Labs received notification of the remote code execution vulnerability (CVE-2024-32030) in Apache Kafka UI, classified as high (CVSS Score 8.1) by NVD.

This vulnerability is caused by the JMX ports connected via the RMI protocol. Attackers can exploit this vulnerability for deserialization and execute arbitrary code, causing server compromise.

Affected Versions

Apache Kafka UI ≤ 0.7.1

Solutions

Remediation Solutions

Check the Component Version

View the version number in the top-left corner of the homepage in the Apache Kafka UI console.

1

Official Solution

Apache has released the latest version to fix the vulnerability. Affected users are strongly advised to update to Apache Kafka UI 0.7.2 and later.

Download link: https://github.com/provectus/kafka-ui

Timeline

On June 25, 2024, Sangfor FarSight Labs received notification of the Apache Kafka UI remote code execution vulnerability (CVE-2024-32030).

On June 25, 2024, Sangfor FarSight Labs released a vulnerability alert.

References

https://github.com/provectus/kafka-ui/pull/4427

https://securitylab.github.com/advisories/GHSL-2023-229_GHSL-2023-230_kafka-ui/

https://github.com/provectus/kafka-ui/commit/83b5a60cc08501b570a0c4d0b4cdfceb1b88d6b7#diff-37e769f4709c1e78c076a5949bbcead74e969725bfd89c7c4ba6d6f229a411e6R36

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

See Other Product