Description
In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka.
Remediation
References
http://www.securityfocus.com/bid/104899
https://www.oracle.com/security-alerts/cpujul2020.html
https://lists.apache.org/thread.html/b6157be1a09df332294213bd21e90dcf9fe4c1810193be54620e4210%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
Related Vulnerabilities
CVE-2017-14735 Vulnerability in maven package org.owasp.antisamy:antisamy
CVE-2021-33604 Vulnerability in maven package com.vaadin:flow-server
CVE-2021-4245 Vulnerability in maven package org.webjars.npm:rfc6902
CVE-2021-46320 Vulnerability in npm package @openzeppelin/contracts
CVE-2021-29445 Vulnerability in npm package jose-node-esm-runtime