Vulnerability Description
In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illegal parameters, leading to SQL injection. This could potentially result in information leakage. Mitigation: Users are recommended to upgrade to version 2.1.2, which fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Streampark | >= 2.0.0, < 2.1.2 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/bhdzh6hnh04yyf3g203bbyvxryd720o2Mailing ListVendor Advisory
- https://lists.apache.org/thread/bhdzh6hnh04yyf3g203bbyvxryd720o2Mailing ListVendor Advisory
FAQ
What is CVE-2023-30867?
CVE-2023-30867 is a vulnerability with a CVSS score of 4.9 (MEDIUM). In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from ta...
How severe is CVE-2023-30867?
CVE-2023-30867 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-30867?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Streampark.