Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29737— Apache StreamPark (incubating): maven build params could trigger remote command execution

EPSS 0.75% · P73
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-29737

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache StreamPark (incubating): maven build params could trigger remote command execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low. Mitigation: all users should upgrade to 2.1.4 Background info: Log in to Streampark using the default username (e.g. test1, test2, test3) and the default password (streampark). Navigate to the Project module, then add a new project. Enter the git repository address of the project and input `touch /tmp/success_2.1.2` as the "Build Argument". Note that there is no verification and interception of the special character "`". As a result, you will find that this injection command will be successfully executed after executing the build. In the latest version, the special symbol ` is intercepted.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache StreamPark 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache StreamPark是美国阿帕奇(Apache)基金会的一个流媒体应用程序开发框架。 Apache StreamPark 2.0.0至2.1.4之前版本存在命令注入漏洞,该漏洞源于输入参数验证不严格,攻击者可以插入命令进行远程命令执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache StreamPark (incubating) 2.0.0 ~ 2.1.4 -

II. Public POCs for CVE-2024-29737

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-29737

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2024-07-17 · 8 CVEs total

CVE-2024-39863Apache Airflow: Potential XSS Vulnerability
CVE-2024-39877Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler
CVE-2023-52291Apache StreamPark (incubating): Unchecked maven build params could trigger remote command
CVE-2024-30471Apache StreamPipes: Potential creation of multiple identical accounts
CVE-2024-31979Apache StreamPipes: Possibility of SSRF in pipeline element installation process
CVE-2024-31411Apache StreamPipes: Potential remote code execution (RCE) via file upload
CVE-2024-29120Apache StreamPark: Information leakage vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2024-29737

No comments yet


Leave a comment