In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illegal parameters, leading to SQL injection. This could potentially result in information leakage.
Mitigation:
Users are recommended to upgrade to version 2.1.2, which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/bhdzh6hnh04yyf3g203bbyvxryd720o2 | Mailing List Vendor Advisory |
Configurations
History
21 Dec 2023, 19:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
CWE | CWE-89 | |
First Time |
Apache streampark
Apache |
|
References | () https://lists.apache.org/thread/bhdzh6hnh04yyf3g203bbyvxryd720o2 - Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:* |
15 Dec 2023, 13:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-15 13:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-30867
Mitre link : CVE-2023-30867
CVE.ORG link : CVE-2023-30867
JSON object : View
Products Affected
apache
- streampark
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')