Kafka UI Vulnerability Could Lead to Post-Auth Remote Code Execution
CVE-2024-32030

8.1HIGH

Key Information:

Vendor

Provectus

Status
Vendor
CVE Published:
19 June 2024

What is CVE-2024-32030?

Kafka UI, an open-source web interface for managing Apache Kafka, is vulnerable to a deserialization attack due to the exposed JMX features that rely on the RMI protocol. This vulnerability can be exploited when the 'dynamic.config.enabled' property is activated, which is often recommended in various Kafka UI tutorials. Attackers can leverage this flaw if they gain access to the Kafka cluster or through a maliciously configured Kafka UI backend. Without proper authentication enabled by default in Kafka UI, an attacker could execute arbitrary code on the server, jeopardizing the integrity of the entire system. To mitigate this risk, users are advised to upgrade to Kafka UI version 0.7.2 or later, as there are no known workarounds for this vulnerability. This security issue was identified and reported by the GitHub Security Lab.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

kafka-ui < 0.7.2

References

EPSS Score

81% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.