CVE-2024-34457

On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to 2.1.4
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:18

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/22/2 -
References () https://lists.apache.org/thread/brlfrmvw9dcv38zoofmhxg7qookmwn7j - Mailing List, Vendor Advisory () https://lists.apache.org/thread/brlfrmvw9dcv38zoofmhxg7qookmwn7j - Mailing List, Vendor Advisory

11 Sep 2024, 11:15

Type Values Removed Values Added
CWE CWE-269
Summary (en) On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to 2.1.4 (en) On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to 2.1.4
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/07/22/2', 'tags': ['Mailing List'], 'source': 'security@apache.org'}
  • () https://www.openwall.com/lists/oss-security/2024/07/22/2 -

10 Sep 2024, 15:09

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/07/22/2 - () http://www.openwall.com/lists/oss-security/2024/07/22/2 - Mailing List
References () https://lists.apache.org/thread/brlfrmvw9dcv38zoofmhxg7qookmwn7j - () https://lists.apache.org/thread/brlfrmvw9dcv38zoofmhxg7qookmwn7j - Mailing List, Vendor Advisory
CPE cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*
CWE CWE-639
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Apache streampark
Apache

22 Jul 2024, 14:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/22/2 -

22 Jul 2024, 13:00

Type Values Removed Values Added
Summary
  • (es) En versiones anteriores a la 2.1.4, después de que un usuario normal inicia sesión con éxito, puede realizar una solicitud manualmente utilizando el token de autorización para ver la información de flink de todos los usuarios, incluidos runSQL y config. Mitigación: todos los usuarios deben actualizar a 2.1.4

22 Jul 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-22 10:15

Updated : 2024-11-21 09:18


NVD link : CVE-2024-34457

Mitre link : CVE-2024-34457

CVE.ORG link : CVE-2024-34457


JSON object : View

Products Affected

apache

  • streampark
CWE
CWE-639

Authorization Bypass Through User-Controlled Key