RULE(RULE ID:337304)

Rule General Information
Release Date: 2023-02-10
Rule Name: Apache Kafka Connect JNDI Injection Vulnerability (CVE-2023-25194)
Severity:
CVE ID:
Rule Protection Details
Description: Kafka is an open source stream processing platform developed by the Apache Software Foundation. The goal of the project is to provide a unified, high-throughput, and low-latency platform for processing real-time data. Kafka Connect is a tool for the scalable and reliable transfer of data between Apache Kafka and other data systems. A security vulnerability has been discovered in Apache Kafka Connect, which affect Kafka Connect clusters starting from Apache Kafka 2.3.0. When configuring a connector via the Kafka Connect REST API, an authenticated administrator can set the "sasl.jaas.config" property of any connector's Kafka client to "com.sun.security.auth.module.JndiLoginModule", which Will allow the server to connect to the attacker's LDAP server, the attacker can trigger unrestricted deserialization of untrusted data or remote code execution vulnerabilities. Starting with Apache Kafka 3.4.0, a system property ("-Dorg.apache.kafka.disallowed.login.modules") was added to disable problematic login modules in SASL JAAS configurations. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0. Kafka Connect users are advised to validate connector configurations and only allow trusted JNDI configurations. Also check for vulnerable versions of connector dependencies and either upgrade their connector, upgrade that specific dependency, or delete the connector.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: https://kafka.apache.org/cve-list
https://lists.apache.org/thread/vy1c7fqcdqvq5grcqp6q5jyyb302khyz
Solutions
The official security update 3.4.0 has been released, it is recommended to upgrade to a security version