Apache

Streampark

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 22.08.2025 18:24:22
  • Last modified 26.08.2025 19:18:01

SQL Injection vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue. This vulnerability is present only in the distribution pack...

  • EPSS 0.12%
  • Published 23.07.2024 09:15:02
  • Last modified 10.07.2025 18:24:57

On versions before 2.1.4, session is not invalidated after logout. When the user logged in successfully, the Backend service returns "Authorization" as the front-end authentication credential. "Authorization" can still initiate requests and access da...

  • EPSS 0.15%
  • Published 22.07.2024 10:15:03
  • Last modified 21.11.2024 09:18:43

On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to ...

  • EPSS 7.01%
  • Published 18.07.2024 12:15:02
  • Last modified 13.02.2025 18:17:50

On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability...

  • EPSS 0.06%
  • Published 17.07.2024 15:15:14
  • Last modified 23.06.2025 18:09:18

In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the adminis...

  • EPSS 0.32%
  • Published 17.07.2024 09:15:02
  • Last modified 13.02.2025 18:15:54

In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user...

  • EPSS 0.6%
  • Published 17.07.2024 09:15:02
  • Last modified 13.02.2025 18:17:50

In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user...

  • EPSS 0.24%
  • Published 16.07.2024 08:15:02
  • Last modified 10.07.2025 18:18:52

In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated,...

  • EPSS 0.4%
  • Published 15.12.2023 13:15:07
  • Last modified 21.11.2024 08:01:00

In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the j...

  • EPSS 1.9%
  • Published 15.12.2023 13:15:07
  • Last modified 21.11.2024 08:33:59

In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a suc...