logo

CVE-2022-46365 org.apache.streampark:streampark

Package

Manager: maven
Name: org.apache.streampark:streampark
Vulnerable Version: >=1.0.0 <2.0.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00041 pctl0.11352

Details

Apache StreamPark Improper Input Validation vulnerability Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later.

Metadata

Created: 2023-07-06T19:24:19Z
Modified: 2023-07-06T23:08:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-m5h8-2pjw-vg3j/GHSA-m5h8-2pjw-vg3j.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-m5h8-2pjw-vg3j
Finding: F184
Auto approve: 1