CVE-2023-48396
CVSS V2 None
CVSS V3 None
Description
Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is hardcoded in the application, an attacker can forge
any token to log in any user.
Attacker can get secret key in /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token.
This issue affects Apache SeaTunnel: 1.0.0.
Users are recommended to upgrade to version 1.0.1, which fixes the issue.
Overview
- CVE ID
- CVE-2023-48396
- Assigner
- apache
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-30T08:15:33.731Z
- Last Modified Date
- 2024-07-30T15:20:29.540Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://lists.apache.org/thread/1tdxfjksx0vb9gtyt77wlr6rdcy1qwmw | vendor-advisory |
http://www.openwall.com/lists/oss-security/2024/07/30/1 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-48396 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48396 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-07-31 13:00:30 | Added to TrackCVE |