CVE-2023-30867

CVSS v3.1 4.9 (Medium)
49% Progress
EPSS 0.06 % (28th)
0.06% Progress
Affected Products 1
Advisories 1

In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illegal parameters, leading to SQL injection. This could potentially result in information leakage.

Mitigation:

Users are recommended to upgrade to version 2.1.2, which fixes the issue.

Weaknesses
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE Status
PUBLISHED
CNA
Apache Software Foundation
Published Date
2023-12-15 13:15:07
(9 months ago)
Updated Date
2023-12-21 19:58:39
(9 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Apache Streampark from 2.0.0 version and prior 2.1.2 version cpe:2.3:a:apache:streampark >= 2.0.0 < 2.1.2
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...