Description
In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illegal parameters, leading to SQL injection. This could potentially result in information leakage.
Mitigation:
Users are recommended to upgrade to version 2.1.2, which fixes the issue.
Mitigation:
Users are recommended to upgrade to version 2.1.2, which fixes the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rrcg-jwr5-32g7 | Apache StreamPark: Authenticated system users could trigger SQL injection vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-02T14:37:15.494Z
Reserved: 2023-04-19T10:43:44.618Z
Link: CVE-2023-30867
No data.
Status : Modified
Published: 2023-12-15T13:15:07.223
Modified: 2024-11-21T08:01:00.287
Link: CVE-2023-30867
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA