|
Message-ID: <CAKYehMbynyKHX8Qehab06G70Y0EBNCVDUwHxDJm+k92R4s_Tpw@mail.gmail.com> Date: Fri, 21 Apr 2023 00:12:17 +0800 From: Huajie Wang <benjobs@...che.org> To: oss-security@...ts.openwall.com Cc: dev <dev@...eampark.apache.org> Subject: CVE-2022-46365: Apache StreamPark (incubating): Logic error causing any account reset Logic error causing any account reset in Apache StreamPark Severity: Important Versions Affected: Apache StreamPark 1.0.0 before 2.0.0 Description: When the user use apache streampark and successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malicious attackers to send any username to modify and reset the account, Mitigation: Users of the affected versions should apply one of the following - Upgrade to Apache StreamPark 2.0.0 or later References: https://streampark.incubator.apache.orghttps://www.cve.org/CVERecord?id=CVE-2022-46365 Best, Huajie Wang
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.