MySQL Security Vulnerability in Apache SeaTunnel
CVE-2023-49198
7.5HIGH
Summary
A security vulnerability in Apache SeaTunnel affects the MySQL server, enabling attackers to gain unauthorized access to files by altering the parameters in the MySQL URL. Specifically, by setting certain parameters such as allowLoadLocalInfile and allowUrlInLocalInfile to true, along with crafting specific paths, attackers can exploit this flaw to read sensitive information stored on the server. It is crucial for users running Apache SeaTunnel version 1.0.0 to upgrade to version 1.0.1 to protect against this issue and secure their MySQL environment.
Affected Version(s)
Apache SeaTunnel Web 1.0.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
jiahua huang