CVE-2022-34321

8.2 HIGH

📋 TL;DR

Apache Pulsar Proxy has an improper authentication vulnerability that allows unauthenticated access to the /proxy-stats endpoint. This exposes connection statistics and allows logging level manipulation, potentially leading to information disclosure or denial-of-service. Affected versions range from 2.6.0 through multiple major releases up to 3.1.0.

💻 Affected Systems

Products:
  • Apache Pulsar Proxy
Versions: 2.6.0 to 2.10.5, 2.11.0 to 2.11.2, 3.0.0 to 3.0.1, and 3.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Default configuration exposes the vulnerable endpoint. In Kubernetes deployments with Apache Pulsar Helm chart, client IPs may be obscured by load balancer configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive connection data including client IPs and manipulate logging levels to cause denial-of-service through excessive logging overhead.

🟠

Likely Case

Unauthorized access to proxy statistics revealing connection details and potential logging manipulation in exposed environments.

🟢

If Mitigated

Minimal impact if proxy is properly isolated within secured network per architectural design.

🌐 Internet-Facing: HIGH - Direct internet exposure allows unauthenticated access to sensitive endpoint.
🏢 Internal Only: MEDIUM - Internal attackers could still access statistics and manipulate logging without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct HTTP access to /proxy-stats endpoint without authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.6, 2.11.3, 3.0.2, 3.1.1 or newer

Vendor Advisory: https://pulsar.apache.org/security/CVE-2022-34321/

Restart Required: Yes

Instructions:

1. Identify current Pulsar Proxy version. 2. Upgrade to patched version based on major release: 2.10.x → 2.10.6+, 2.11.x → 2.11.3+, 3.0.x → 3.0.2+, 3.1.x → 3.1.1+. 3. Restart Pulsar Proxy service.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict network access to Pulsar Proxy endpoints using firewall rules

iptables -A INPUT -p tcp --dport <proxy-port> -s <trusted-networks> -j ACCEPT
iptables -A INPUT -p tcp --dport <proxy-port> -j DROP

Reverse Proxy Authentication

all

Place Pulsar Proxy behind authenticated reverse proxy

🧯 If You Can't Patch

  • Implement strict network segmentation to prevent unauthorized access to Pulsar Proxy
  • Deploy web application firewall with authentication requirements for /proxy-stats endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP GET request to http://<pulsar-proxy>:<port>/proxy-stats without authentication. If it returns statistics data, system is vulnerable.

Check Version:

Check Pulsar Proxy logs or run: pulsar-admin brokers version (if admin access available)

Verify Fix Applied:

After patching, attempt same unauthenticated request to /proxy-stats endpoint. Should return authentication error or 403 Forbidden.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /proxy-stats endpoint
  • Sudden increase in logging volume from proxy

Network Indicators:

  • Unusual traffic patterns to /proxy-stats endpoint
  • External IPs accessing proxy statistics

SIEM Query:

source="pulsar-proxy" AND (uri_path="/proxy-stats" OR message="*proxy-stats*") AND NOT (user="authenticated_user")

🔗 References

📤 Share & Export