You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
Remediation:
The fix is available in a new forked repo kafbat/kafka-ui docker image or io.kafbat.ui maven package.
In 1.0 groovy filters have been replaced by CEL filters, which by the nature make these kind of attacks unapplicable. https://github.com/kafbat/kafka-ui/releases/tag/v1.0.0
An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
https://packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html
https://github.com/BobTheShoplifter/CVE-2023-52251-POC
https://nvd.nist.gov/vuln/detail/CVE-2023-52251
Remediation:
The fix is available in a new forked repo kafbat/kafka-ui docker image or io.kafbat.ui maven package.
In 1.0 groovy filters have been replaced by CEL filters, which by the nature make these kind of attacks unapplicable.
https://github.com/kafbat/kafka-ui/releases/tag/v1.0.0