RULE(RULE ID:338500)

Rule General Information
Release Date: 2024-10-31
Rule Name: Apache Kafka UI Remote Code Execution Vulnerability (CVE-2024-32030)
Severity:
CVE ID:
Rule Protection Details
Description: The Apache Kafka UI API allows users to connect to different Kafka brokers by specifying a network address and port, and provides the ability to monitor Kafka brokers performance by connecting to its JMX port, which is based on the RMI protocol and therefore may be vulnerable to deserialization attacks. With Kafka-UI not enabled with authentication by default, a threat could create a malicious JMX listener that returns a malicious serialized object for any RMI call, and successful exploitation of the vulnerability could result in remote code execution. The vulnerability requires the configuration of a malicious host, but the added host cannot be distinguished from a normal service host or a malicious host. Therefore, some false positives may occur and need to be analyzed based on the actual situation.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.