CVE-2024-48988
- EPSS 0.04%
- Published 22.08.2025 18:24:22
- Last modified 26.08.2025 19:18:01
SQL Injection vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue. This vulnerability is present only in the distribution pack...
CVE-2024-29070
- EPSS 0.12%
- Published 23.07.2024 09:15:02
- Last modified 10.07.2025 18:24:57
On versions before 2.1.4, session is not invalidated after logout. When the user logged in successfully, the Backend service returns "Authorization" as the front-end authentication credential. "Authorization" can still initiate requests and access da...
CVE-2024-34457
- EPSS 0.15%
- Published 22.07.2024 10:15:03
- Last modified 21.11.2024 09:18:43
On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to ...
CVE-2024-29178
- EPSS 7.01%
- Published 18.07.2024 12:15:02
- Last modified 13.02.2025 18:17:50
On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability...
CVE-2024-29120
- EPSS 0.06%
- Published 17.07.2024 15:15:14
- Last modified 23.06.2025 18:09:18
In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the adminis...
CVE-2023-52291
- EPSS 0.32%
- Published 17.07.2024 09:15:02
- Last modified 13.02.2025 18:15:54
In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user...
CVE-2024-29737
- EPSS 0.6%
- Published 17.07.2024 09:15:02
- Last modified 13.02.2025 18:17:50
In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user...
CVE-2023-52290
- EPSS 0.24%
- Published 16.07.2024 08:15:02
- Last modified 10.07.2025 18:18:52
In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated,...
CVE-2023-30867
- EPSS 0.4%
- Published 15.12.2023 13:15:07
- Last modified 21.11.2024 08:01:00
In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the j...
CVE-2023-49898
- EPSS 1.9%
- Published 15.12.2023 13:15:07
- Last modified 21.11.2024 08:33:59
In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a suc...