In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated, there is a risk of SQL injection vulnerability. The attacker must successfully log into the system to launch an attack, which may cause data leakage. Since no data will be written, so this is a low-impact vulnerability.
Mitigation:
all users should upgrade to 2.1.4, Such parameters will be blocked.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/t3mcm8pb65d9gj3wrgtj9sx9s2pfvvl3 | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/07/15/4 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t3mcm8pb65d9gj3wrgtj9sx9s2pfvvl3 | Mailing List Vendor Advisory |
Configurations
History
10 Jul 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache streampark
Apache |
|
CPE | cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:* | |
References | () https://lists.apache.org/thread/t3mcm8pb65d9gj3wrgtj9sx9s2pfvvl3 - Mailing List, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/15/4 - Mailing List, Third Party Advisory |
Information
Published : 2024-07-16 08:15
Updated : 2025-07-10 18:18
NVD link : CVE-2023-52290
Mitre link : CVE-2023-52290
CVE.ORG link : CVE-2023-52290
JSON object : View
Products Affected
apache
- streampark
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')