![]() |
|
Message-ID: <d4fabfcd-4996-20b3-0d7a-37cefce89433@apache.org> Date: Sat, 12 Apr 2025 05:56:55 +0000 From: Hailin Wang <wanghailin@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-32896: Apache SeaTunnel: Unauthenticated insecure access Severity: moderate Affected versions: - Apache SeaTunnel 2.3.1 through 2.3.10 Description: # Summary Unauthorized users can perform Arbitrary File Read and Deserialization attack by submit job using restful api-v1. # Details Unauthorized users can access `/hazelcast/rest/maps/submit-job` to submit job. An attacker can set extra params in mysql url to perform Arbitrary File Read and Deserialization attack. This issue affects Apache SeaTunnel: <=2.3.10 # Fixed Users are recommended to upgrade to version 2.3.11, and enable restful api-v2 & open https two-way authentication , which fixes the issue. https://github.com/apache/seatunnel/pull/9010 Credit: Owen Amadeus (reporter) References: https://seatunnel.apache.org https://www.cve.org/CVERecord?id=CVE-2025-32896
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.