Apache SeaTunnel Web Authentication Vulnerability
CVE-2023-48396
9.1CRITICAL
Summary
A web authentication vulnerability has been identified in Apache SeaTunnel, wherein a hardcoded JWT key allows attackers to forge tokens and gain unauthorized access to user accounts. The flawed authentication process permits the exploitation of the secret key found within the configuration file located at /seatunnel-server/seatunnel-app/src/main/resources/application.yml. Users are urged to upgrade to Apache SeaTunnel version 1.0.1 to resolve this critical issue and secure their applications from potential token forgery.
Affected Version(s)
Apache SeaTunnel Web 1.0.0
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
jiahua huang / Joyh