GHSA-8m84-h9hh-3cfh

Suggest an improvement
Source
https://github.com/advisories/GHSA-8m84-h9hh-3cfh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-8m84-h9hh-3cfh/GHSA-8m84-h9hh-3cfh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8m84-h9hh-3cfh
Aliases
  • CVE-2023-49198
Published
2024-08-21T12:30:25Z
Modified
2024-08-21T20:27:34.679384Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Apache SeaTunnel SQL Injection vulnerability
Details

Mysql security vulnerability in Apache SeaTunnel.

Attackers can read files on the MySQL server by modifying the information in the MySQL URL

allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360 This issue affects Apache SeaTunnel: 1.0.0.

Users are recommended to upgrade to version [1.0.1], which fixes the issue.

Database specific
{
    "nvd_published_at": "2024-08-21T10:15:04Z",
    "cwe_ids": [
        "CWE-552"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-08-21T20:10:12Z"
}
References

Affected packages

Maven / org.apache.seatunnel:seatunnel

Package

Name
org.apache.seatunnel:seatunnel
View open source insights on deps.dev
Purl
pkg:maven/org.apache.seatunnel/seatunnel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0.0
Fixed
1.0.1

Affected versions

1.*

1.0.0