|
Message-ID: <b410dcbd-f5f2-77fa-ff31-e615a59a8eec@apache.org> Date: Wed, 17 Jul 2024 14:54:39 +0000 From: Huajie Wang <benjobs@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-29120: Apache StreamPark: Information leakage vulnerability Severity: important Affected versions: - Apache StreamPark 2.0.0 before 2.1.4 Description: In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the administrator's username, password, salt value, etc. Mitigation: all users should upgrade to 2.1.4 Credit: L0ne1y (reporter) References: https://streampark.incubator.apache.org https://www.cve.org/CVERecord?id=CVE-2024-29120
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.