Learn about CVE-2022-33684, a vulnerability in Apache Pulsar C++ and Python OAuth Clients that enabled MITM attacks due to disabled certificate validation. Find out impact, affected versions, and mitigation steps.
Apache Pulsar C++/Python OAuth Clients prior to 3.0.0 were vulnerable to an MITM attack due to Disabled Certificate Validation
Understanding CVE-2022-33684
This CVE refers to a vulnerability in the Apache Pulsar C++ and Python OAuth Clients that allowed for a man-in-the-middle (MITM) attack due to disabled certificate validation.
What is CVE-2022-33684?
The Apache Pulsar C++ Client did not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection was disabled. This vulnerability enabled attackers to intercept and modify GET requests, potentially compromising authentication data.
The Impact of CVE-2022-33684
This vulnerability could be exploited by attackers who control a machine between the client and the server. By manipulating traffic, they could intercept sensitive authentication information and authenticate with an Apache Pulsar cluster.
Technical Details of CVE-2022-33684
The vulnerability affects Apache Pulsar C++ and Python Clients versions 2.7.0 to 2.7.4, 2.8.0 to 2.8.3, 2.9.0 to 2.9.2, 2.10.0 to 2.10.1, and 2.6.4 and earlier versions.
Vulnerability Description
The flaw allowed for a man-in-the-middle attack during the OAuth2.0 Client Credential Flow, exposing sensitive authentication data to interception and modification.
Affected Systems and Versions
Apache Pulsar C++ and Python Clients versions 2.7 to 2.10 (except 3.0) were affected.
Exploitation Mechanism
Attackers could exploit the vulnerability by manipulating traffic between the client and the server, intercepting and modifying GET requests.
Mitigation and Prevention
To address CVE-2022-33684, users of affected versions are advised to take immediate and long-term security measures.
Immediate Steps to Take
Users of affected versions should upgrade to patched versions and rotate vulnerable OAuth2.0 credentials promptly.
Long-Term Security Practices
Implement robust security practices to safeguard against MITM attacks, including regular credential rotation and secure communication protocols.
Patching and Updates
Upgrade to the following patched versions for each affected client version: 2.7.5 for 2.7, 2.8.4 for 2.8, 2.9.3 for 2.9, and 2.10.2 for 2.10. Users on version 3.0 are unaffected.