Lucene search

K
cvelistApacheCVELIST:CVE-2023-48396
HistoryJul 30, 2024 - 8:15 a.m.

CVE-2023-48396 Apache SeaTunnel Web: Authentication bypass

2024-07-3008:15:33
CWE-290
apache
www.cve.org
9
cve-2023-48396
apache seatunnel
authentication bypass
web
vulnerability
hardcoded jwt key
attacker
secret key
application.yml
token
security update

EPSS

0

Percentile

9.4%

Web Authentication vulnerability in Apache SeaTunnel.Β Since the jwt key is hardcoded in the application, an attacker can forge
any token to log in any user.

Attacker can getΒ secret key inΒ /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token.
This issue affects Apache SeaTunnel: 1.0.0.

Users are recommended to upgrade to version 1.0.1, which fixes the issue.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache SeaTunnel Web",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.0"
      }
    ]
  }
]

EPSS

0

Percentile

9.4%

Related for CVELIST:CVE-2023-48396