CVE-2022-46365: Apache StreamPark Improper Input Validation vulnerability
Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later.
References
- github.com/advisories/GHSA-m5h8-2pjw-vg3j
- github.com/apache/incubator-streampark/blob/dev/streampark-console/streampark-console-service/src/main/java/org/apache/streampark/console/system/controller/UserController.java
- github.com/apache/incubator-streampark/blob/dev/streampark-console/streampark-console-service/src/main/java/org/apache/streampark/console/system/service/impl/UserServiceImpl.java
- github.com/apache/incubator-streampark/commit/4f39d7f422d7519a3febc2d15d31ed0126d54fbc
- github.com/apache/incubator-streampark/pull/2123
- lists.apache.org/thread/f68lcwrp8pcdc4yrbpcm8j7m0f5mjn7h
- nvd.nist.gov/vuln/detail/CVE-2022-46365
Detect and mitigate CVE-2022-46365 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →