CVE-2023-51437
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/02/2024
Last modified:
22/07/2024
Description
Observable timing discrepancy vulnerability in Apache Pulsar SASL Authentication Provider can allow an attacker to forge a SASL Role Token that will pass signature verification.<br />
Users are recommended to upgrade to version 2.11.3, 3.0.2, or 3.1.1 which fixes the issue. Users should also consider updating the configured secret in the `saslJaasServerRoleTokenSignerSecretPath` file.<br />
<br />
Any component matching an above version running the SASL Authentication Provider is affected. That includes the Pulsar Broker, Proxy, Websocket Proxy, or Function Worker.<br />
<br />
2.11 Pulsar users should upgrade to at least 2.11.3.<br />
3.0 Pulsar users should upgrade to at least 3.0.2.<br />
3.1 Pulsar users should upgrade to at least 3.1.1.<br />
Any users running Pulsar 2.8, 2.9, 2.10, and earlier should upgrade to one of the above patched versions.<br />
<br />
For additional details on this attack vector, please refer to https://codahale.com/a-lesson-in-timing-attacks/ .<br />
<br />
Impact
Base Score 3.x
7.40
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:* | 2.10.5 (including) | |
| cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:* | 2.11.0 (including) | 2.11.3 (excluding) |
| cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.0.2 (excluding) |
| cpe:2.3:a:apache:pulsar:3.1.0:-:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:pulsar:3.1.0:candidate_1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



