Sensitive Information Exposure Risk in RocketMQ
CVE-2024-23321

8.8HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
22 July 2024

Summary

The vulnerability presents a significant risk for RocketMQ versions 5.2.0 and earlier, where unauthorized actors may acquire sensitive information despite the application's authentication and authorization functionalities. An attacker with regular user privileges or who is valid on the IP whitelist could exploit specific interfaces to obtain the administrator account and password. This breach could provide the attacker full control over the RocketMQ instance, contingent upon having access to the broker IP list. To alleviate these security concerns, it is imperative for users to upgrade to version 5.3.0 or higher and transition to RocketMQ ACL 2.0 for enhanced security measures.

Affected Version(s)

Apache RocketMQ 4.5.2 <= 5.2.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

BaoChengZhang (LengJingQiCaiSecurityLab)
.