Lucene search

K
githubGitHub Advisory DatabaseGHSA-CP2C-X2PC-FPH7
HistoryJul 30, 2024 - 9:32 a.m.

Apache SeaTunnel Web Authentication vulnerability

2024-07-3009:32:05
CWE-290
GitHub Advisory Database
github.com
11
apache seatunnel
web authentication
vulnerability
hardcoded jwt key
attacker
forge token
upgrade 1.0.1

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.4%

Web Authentication vulnerability in Apache SeaTunnel.Β Since the jwt key is hardcoded in the application, an attacker can forge any token to log in any user.

Attacker can getΒ secret key inΒ /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token. This issue affects Apache SeaTunnel: 1.0.0.

Users are recommended to upgrade to version 1.0.1, which fixes the issue.

Affected configurations

Vulners
Node
org.apache.seatunnel\seatunnelMatchweb
VendorProductVersionCPE
org.apache.seatunnel\seatunnelwebcpe:2.3:a:org.apache.seatunnel\:seatunnel:web:*:*:*:*:*:*:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.4%

Related for GHSA-CP2C-X2PC-FPH7