Lucene search

K

7 matches found

CVE
CVE
added 2024/07/17 9:15 a.m.60 views

CVE-2023-52291

In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and hav...

8.8CVSS5.2AI score0.00316EPSS
CVE
CVE
added 2024/07/17 9:15 a.m.53 views

CVE-2024-29737

In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and hav...

8.8CVSS5.2AI score0.00597EPSS
CVE
CVE
added 2024/07/17 3:15 p.m.52 views

CVE-2024-29120

In Streampark (version

5.9CVSS5.6AI score0.00059EPSS
CVE
CVE
added 2024/07/16 8:15 a.m.51 views

CVE-2023-52290

In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated, there is a risk of SQL injection vulnerability. ...

8.1CVSS8.4AI score0.00241EPSS
CVE
CVE
added 2024/07/22 10:15 a.m.48 views

CVE-2024-34457

On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to 2.1.4

6.5CVSS6.4AI score0.00147EPSS
CVE
CVE
added 2024/07/23 9:15 a.m.44 views

CVE-2024-29070

On versions before 2.1.4, session is not invalidated after logout. When the user logged in successfully, the Backend service returns "Authorization" as the front-end authentication credential. "Authorization" can still initiate requests and access data even after logout. Mitigation: all users shoul...

9.1CVSS6.7AI score0.00118EPSS
CVE
CVE
added 2024/07/18 12:15 p.m.33 views

CVE-2024-29178

On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users should upgrade to 2.1.4

8.8CVSS9AI score0.07006EPSS