Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/f68lcwrp8pcdc4yrbpcm8j7m0f5mjn7h | Mailing List |
https://lists.apache.org/thread/f68lcwrp8pcdc4yrbpcm8j7m0f5mjn7h | Mailing List |
Configurations
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread/f68lcwrp8pcdc4yrbpcm8j7m0f5mjn7h - Mailing List |
Information
Published : 2023-05-01 15:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46365
Mitre link : CVE-2022-46365
CVE.ORG link : CVE-2022-46365
JSON object : View
Products Affected
apache
- streampark
CWE