Lucene search

K
nvd[email protected]NVD:CVE-2023-48396
HistoryJul 30, 2024 - 9:15 a.m.

CVE-2023-48396

2024-07-3009:15:02
CWE-290
web.nvd.nist.gov
7
apache seatunnel
authentication
vulnerability
token
hardcoded key
upgrade
cve-2023-48396

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0

Percentile

9.4%

Web Authentication vulnerability in Apache SeaTunnel.Β Since the jwt key is hardcoded in the application, an attacker can forge
any token to log in any user.

Attacker can getΒ secret key inΒ /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token.
This issue affects Apache SeaTunnel: 1.0.0.

Users are recommended to upgrade to version 1.0.1, which fixes the issue.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0

Percentile

9.4%

Related for NVD:CVE-2023-48396