This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **CVE-2023-52251** is a critical **Remote Code Execution (RCE)** vulnerability in **kafka-ui**. Attackers can inject malicious OS commands via the `q` parameter in the `/api/clusters/local/topics/messages` endpoint.β¦
π‘οΈ **Root Cause:** **OS Command Injection**. The application fails to sanitize user input in the `q` parameter before passing it to system commands.β¦
π¦ **Affected Versions:** **kafka-ui v0.4.0 through v0.7.1**. **Component:** The web UI for Apache Kafka. If you are running any version in this range, you are vulnerable. β οΈ
Q4What can hackers do? (Privileges/Data)
π» **Attacker Capabilities:** Execute **arbitrary code** on the host OS. Privileges: Equivalent to the user running the kafka-ui process.β¦
π **Exploitation Threshold:** **LOW**. No authentication is required for the vulnerable endpoint `/api/clusters/local/topics/messages`. Remote attackers can trigger the exploit directly over the network. π
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exploit:** **YES**. A PoC is available on GitHub (`BobTheShoplifter/CVE-2023-52251-POC`). Also detected by **Nuclei** templates. Wild exploitation is highly likely given the ease of access. π
Q7How to self-check? (Features/Scanning)
π **Self-Check:** Scan for the endpoint `/api/clusters/local/topics/{topic}/messages`. Use tools like **Nuclei** with the CVE-2023-52251 template. Check if your kafka-ui version is between 0.4.0 and 0.7.1. π§ͺ
π οΈ **Workaround:** 1. **Comment out** the Groovy filter function in the source code. 2. **Add Authentication** to the API endpoints immediately. 3. Restrict network access to the kafka-ui interface. π
Q10Is it urgent? (Priority Suggestion)
π¨ **Urgency:** **CRITICAL / HIGH**. Due to the lack of authentication, public PoC, and absence of a patch, this vulnerability is actively exploitable. Immediate mitigation (workaround) is required. π