Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2094 | Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Users of the affected versions should upgrade to Apache StreamPark 2.0.0 or later. |
Github GHSA |
GHSA-m5h8-2pjw-vg3j | Apache StreamPark Improper Input Validation vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 15 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-10-15T16:43:14.987Z
Reserved: 2022-12-02T08:52:04.022Z
Link: CVE-2022-46365
Updated: 2024-08-03T14:31:46.200Z
Status : Modified
Published: 2023-05-01T15:15:09.013
Modified: 2024-11-21T07:30:28.150
Link: CVE-2022-46365
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA