GHSA-m5h8-2pjw-vg3j

Suggest an improvement
Source
https://github.com/advisories/GHSA-m5h8-2pjw-vg3j
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-m5h8-2pjw-vg3j/GHSA-m5h8-2pjw-vg3j.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m5h8-2pjw-vg3j
Aliases
  • CVE-2022-46365
Published
2023-07-06T19:24:19Z
Modified
2023-11-08T04:10:56.373Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
Apache StreamPark Improper Input Validation vulnerability
Details

Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later.

References

Affected packages

Maven / org.apache.streampark:streampark

Package

Name
org.apache.streampark:streampark
View open source insights on deps.dev
Purl
pkg:maven/org.apache.streampark/streampark

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0.0
Fixed
2.0.0