8.8
CVSSv3

CVE-2023-52251

Published: 25/01/2024 Updated: 29/02/2024
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

An issue discovered in provectus kafka-ui 0.4.0 up to and including 0.7.1 allows remote malicious users to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

provectus ui

Vendor Advisories

Check Point Reference: CPAI-2023-1545 Date Published: 28 Feb 2024 Severity: High ...

Exploits

A command injection vulnerability exists in Kafka UI versions 040 through 071 that allows an attacker to inject and execute arbitrary shell commands via the groovy filter parameter at the topic section ...

Github Repositories

CVE-2023-52251 There is a Remote Code Execution vulnerability provectus/kafka-ui.

CVE-2023-52251-POC There is a Remote Code Execution vulnerability provectus/kafka-ui There is no patch as of writing this, but the vendor is notified by us and the team over at VINCE without any response Report was sent Sep 27, 2023 to provectus both via email and github security Remediation We suggest commenting out the entire groovy filter function/adding authentication as