Lucene search

K
githubGitHub Advisory DatabaseGHSA-RRCG-JWR5-32G7
HistoryDec 15, 2023 - 3:30 p.m.

Apache StreamPark: Authenticated system users could trigger SQL injection vulnerability

2023-12-1515:30:27
CWE-89
GitHub Advisory Database
github.com
2
apache streampark
authenticated users
sql injection
vulnerability
information leakage
upgrade
version 2.1.2
mitigation
software

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

28.4%

In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like ‘%jobName%’. However, the jobName field may receive illegal parameters, leading to SQL injection. This could potentially result in information leakage.

Mitigation:

Users are recommended to upgrade to version 2.1.2, which fixes the issue.

Affected configurations

Vulners
Node
org.apache.streampark\Matchstreampark

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

28.4%

Related for GHSA-RRCG-JWR5-32G7