Lucene search

K

7 matches found

CVE
CVE
added 2024/07/17 9:15 a.m.59 views

CVE-2023-52291

In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and hav...

8.8CVSS5.2AI score0.00077EPSS
CVE
CVE
added 2024/07/17 3:15 p.m.51 views

CVE-2024-29120

In Streampark (version

5.9CVSS5.6AI score0.00066EPSS
CVE
CVE
added 2024/07/17 9:15 a.m.51 views

CVE-2024-29737

In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and hav...

8.8CVSS5.2AI score0.00126EPSS
CVE
CVE
added 2024/07/16 8:15 a.m.50 views

CVE-2023-52290

In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated, there is a risk of SQL injection vulnerability. ...

8.1CVSS8.4AI score0.00289EPSS
CVE
CVE
added 2024/07/22 10:15 a.m.47 views

CVE-2024-34457

On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to 2.1.4

6.5CVSS6.4AI score0.00158EPSS
CVE
CVE
added 2024/07/23 9:15 a.m.43 views

CVE-2024-29070

On versions before 2.1.4, session is not invalidated after logout. When the user logged in successfully, the Backend service returns "Authorization" as the front-end authentication credential. "Authorization" can still initiate requests and access data even after logout. Mitigation: all users shoul...

9.1CVSS6.7AI score0.00322EPSS
CVE
CVE
added 2024/07/18 12:15 p.m.32 views

CVE-2024-29178

On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users should upgrade to 2.1.4

8.8CVSS9AI score0.01753EPSS