CVE-2022-46365 – org.apache.streampark:streampark
Package
Manager: maven
Name: org.apache.streampark:streampark
Vulnerable Version: >=1.0.0 <2.0.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00041 pctl0.11352
Details
Apache StreamPark Improper Input Validation vulnerability Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later.
Metadata
Created: 2023-07-06T19:24:19Z
Modified: 2023-07-06T23:08:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-m5h8-2pjw-vg3j/GHSA-m5h8-2pjw-vg3j.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-m5h8-2pjw-vg3j
Finding: F184
Auto approve: 1