Mysql security vulnerability in Apache SeaTunnel.
Attackers can read files on the MySQL server by modifying the information in the MySQL URL
allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360
This issue affects Apache SeaTunnel: 1.0.0.
Users are recommended to upgrade to version [1.0.1], which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/48j9f1nsn037mgzc4j9o51nwglb1s08h | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/08/21/2 |
Configurations
History
No history.
Information
Published : 2024-08-21 10:15
Updated : 2024-11-21 08:33
NVD link : CVE-2023-49198
Mitre link : CVE-2023-49198
CVE.ORG link : CVE-2023-49198
JSON object : View
Products Affected
apache
- seatunnel
CWE
CWE-552
Files or Directories Accessible to External Parties