{"id":246324,"date":"2024-07-22T16:07:49","date_gmt":"2024-07-22T16:07:49","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/07\/22\/critical-rce-vulnerabilities-discovered-in-kafka-ui\/"},"modified":"2025-06-25T17:14:14","modified_gmt":"2025-06-25T17:14:14","slug":"critical-rce-vulnerabilities-discovered-in-kafka-ui","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/07\/22\/critical-rce-vulnerabilities-discovered-in-kafka-ui\/","title":{"rendered":"Critical RCE Vulnerabilities Discovered in Kafka UI"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<figure class=\"figure mt-2\">&#13;<br \/>\n                                &#13;<\/p>\n<p>&#13;<br \/>\n                                    <a href=\"https:\/\/blockchain.news\/Profile\/Peter-Zhang\">Peter Zhang<\/a>&#13;<br \/>\n                                    <span class=\"publication-date ml-2\"> Jul 22, 2024 15:37<\/span>&#13;\n                                <\/p>\n<p>&#13;<\/p>\n<p class=\"lead\">Researchers identified three critical remote code execution (RCE) vulnerabilities in Kafka UI. Users are advised to upgrade to version 0.7.2 to mitigate risks.<\/p>\n<p>&#13;<br \/>\n                                <a href=\"https:\/\/image.blockchain.news:443\/features\/24B6EBDC6093F0C1F639A6A7DA12473E2D2C5C390185833B0F398CC7FCE1368C.jpg\">&#13;<br \/>\n                                    <img decoding=\"async\" class=\"rounded\" src=\"https:\/\/image.blockchain.news:443\/features\/24B6EBDC6093F0C1F639A6A7DA12473E2D2C5C390185833B0F398CC7FCE1368C.jpg\" alt=\"Critical RCE Vulnerabilities Discovered in Kafka UI\"\/>&#13;<br \/>\n                                <\/a>&#13;<br \/>\n                            <\/figure>\n<p>Researchers have uncovered three critical remote code execution (RCE) vulnerabilities in Kafka UI, an open source web application used for managing and monitoring Apache Kafka clusters, according to <a rel=\"nofollow\" href=\"https:\/\/github.blog\/2024-07-22-3-ways-to-get-remote-code-execution-in-kafka-ui\/\">The GitHub Blog<\/a>. These vulnerabilities have been addressed in the latest release, version 0.7.2, and users are strongly encouraged to update their systems to mitigate potential exploits.<\/p>\n<h2>CVE-2023-52251: RCE via Groovy Script Execution<\/h2>\n<p>The first vulnerability, identified as CVE-2023-52251, leverages the message filtering functionality within Kafka UI. Attackers can use the <code>GROOVY_SCRIPT<\/code> filter type to execute arbitrary Groovy scripts, leading to potential RCE. The exploit can be initiated through a simple HTTP GET request, making it highly accessible. The vulnerability was reported in November 2023 and patched in April 2024.<\/p>\n<h2>CVE-2024-32030: RCE via JMX Connector<\/h2>\n<p>The second vulnerability, CVE-2024-32030, involves the Java Management Extensions (JMX) connector used by Kafka UI to monitor Kafka brokers. If the <code>dynamic.config.enabled<\/code> setting is activated, attackers can configure Kafka UI to connect to a malicious JMX server, leading to deserialization attacks. This vulnerability was also fixed in the 0.7.2 release.<\/p>\n<h2>CVE-2023-25194: RCE via JndiLoginModule<\/h2>\n<p>The third vulnerability, CVE-2023-25194, exploits the JndiLoginModule for authentication. Attackers can manipulate cluster properties to trigger RCE. This issue is only exploitable if the <code>dynamic.config.enabled<\/code> property is set to <code>true<\/code>. The fix was included in the 0.7.2 release, prohibiting the use of the JndiLoginModule.<\/p>\n<p>Kafka UI users are advised to upgrade to version 0.7.2 to secure their systems against these critical vulnerabilities. The fixes include updating dependencies and adding stricter controls to prevent potential exploits.<\/p>\n<p><span><i>Image source: Shutterstock<\/i><\/span><\/p>\n<p>                            <!-- Divider --><\/p>\n<p>                            <!-- Author info END --><br \/>\n                            <!-- Divider --><\/p><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/blockchain.news\/news\/critical-rce-vulnerabilities-discovered-in-kafka-ui\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] &#13; &#13; &#13; Peter Zhang&#13; Jul 22, 2024 15:37&#13; &#13; Researchers identified three critical remote code execution (RCE) vulnerabilities in Kafka UI. Users are<\/p>\n","protected":false},"author":1,"featured_media":246325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[171],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/246324"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=246324"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/246324\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/246325"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=246324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=246324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=246324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}