Lucene search

K
osvGoogleOSV:GHSA-CP2C-X2PC-FPH7
HistoryJul 30, 2024 - 9:32 a.m.

Apache SeaTunnel Web Authentication vulnerability

2024-07-3009:32:05
Google
osv.dev
7
apache seatunnel
web authentication
hardcoded jwt key
attacker
token
security vulnerability
upgrade

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.4%

Web Authentication vulnerability in Apache SeaTunnel.Β Since the jwt key is hardcoded in the application, an attacker can forge any token to log in any user.

Attacker can getΒ secret key inΒ /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token. This issue affects Apache SeaTunnel: 1.0.0.

Users are recommended to upgrade to version 1.0.1, which fixes the issue.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0

Percentile

9.4%

Related for OSV:GHSA-CP2C-X2PC-FPH7