漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Apache SeaTunnel: Unauthenticated insecure access
Vulnerability Description
# Summary Unauthorized users can perform Arbitrary File Read and Deserialization attack by submit job using restful api-v1. # Details Unauthorized users can access `/hazelcast/rest/maps/submit-job` to submit job. An attacker can set extra params in mysql url to perform Arbitrary File Read and Deserialization attack. This issue affects Apache SeaTunnel: <=2.3.10 # Fixed Users are recommended to upgrade to version 2.3.11, and enable restful api-v2 & open https two-way authentication , which fixes the issue.
CVSS Information
N/A
Vulnerability Type
关键功能的认证机制缺失
Vulnerability Title
Apache SeaTunnel 访问控制错误漏洞
Vulnerability Description
Apache SeaTunnel是美国阿帕奇(Apache)基金会的一个简单易用的数据集成框架。 Apache SeaTunnel 2.3.10及之前版本存在访问控制错误漏洞,该漏洞源于未授权用户可以通过restful api-v1提交作业执行任意文件读取和反序列化攻击。
CVSS Information
N/A
Vulnerability Type
N/A