Sensitive Information Exposure Risk in RocketMQ
CVE-2024-23321
Summary
The vulnerability presents a significant risk for RocketMQ versions 5.2.0 and earlier, where unauthorized actors may acquire sensitive information despite the application's authentication and authorization functionalities. An attacker with regular user privileges or who is valid on the IP whitelist could exploit specific interfaces to obtain the administrator account and password. This breach could provide the attacker full control over the RocketMQ instance, contingent upon having access to the broker IP list. To alleviate these security concerns, it is imperative for users to upgrade to version 5.3.0 or higher and transition to RocketMQ ACL 2.0 for enhanced security measures.
Affected Version(s)
Apache RocketMQ 4.5.2 <= 5.2.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved