CVE-2025-54981
- EPSS 0.02%
- Veröffentlicht 12.12.2025 15:15:53
- Zuletzt bearbeitet 12.12.2025 20:15:41
Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache St...
CVE-2025-54947
- EPSS 0.02%
- Veröffentlicht 12.12.2025 15:15:53
- Zuletzt bearbeitet 12.12.2025 19:16:02
In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or sec...
CVE-2025-53960
- EPSS 0.01%
- Veröffentlicht 12.12.2025 15:15:49
- Zuletzt bearbeitet 12.12.2025 19:16:02
When encrypting sensitive data, weak encryption keys that are fixed or directly generated based on user passwords are used. Attackers can obtain these keys through methods such as reverse engineering, code leaks, or password guessing, thereby decrypt...
CVE-2025-30001
- EPSS 0.12%
- Veröffentlicht 10.10.2025 09:52:26
- Zuletzt bearbeitet 04.11.2025 22:16:09
Incorrect Execution-Assigned Permissions vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue.
CVE-2024-48988
- EPSS 0.06%
- Veröffentlicht 22.08.2025 18:24:22
- Zuletzt bearbeitet 04.11.2025 22:16:04
SQL Injection vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue. This vulnerability is present only in the distribution pack...
CVE-2024-29070
- EPSS 0.16%
- Veröffentlicht 23.07.2024 09:15:02
- Zuletzt bearbeitet 10.07.2025 18:24:57
On versions before 2.1.4, session is not invalidated after logout. When the user logged in successfully, the Backend service returns "Authorization" as the front-end authentication credential. "Authorization" can still initiate requests and access da...
CVE-2024-34457
- EPSS 0.2%
- Veröffentlicht 22.07.2024 10:15:03
- Zuletzt bearbeitet 21.11.2024 09:18:43
On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to ...
CVE-2024-29178
- EPSS 9.22%
- Veröffentlicht 18.07.2024 12:15:02
- Zuletzt bearbeitet 13.02.2025 18:17:50
On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability...
CVE-2024-29120
- EPSS 0.08%
- Veröffentlicht 17.07.2024 15:15:14
- Zuletzt bearbeitet 23.06.2025 18:09:18
In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the adminis...
CVE-2024-29737
- EPSS 0.81%
- Veröffentlicht 17.07.2024 09:15:02
- Zuletzt bearbeitet 13.02.2025 18:17:50
In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user...