Mysql security vulnerability in Apache SeaTunnel.
Attackers can read files on the MySQL server by modifying the information in the MySQL URL
allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360 This issue affects Apache SeaTunnel: 1.0.0.
Users are recommended to upgrade to version [1.0.1], which fixes the issue.
{ "nvd_published_at": "2024-08-21T10:15:04Z", "cwe_ids": [ "CWE-552" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-08-21T20:10:12Z" }