In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated, there is a risk of SQL injection vulnerability. The attacker must successfully log into the system to launch an attack, which may cause data leakage. Since no data will be written, so this is a low-impact vulnerability. Mitigation: all users should upgrade to 2.1.4, Such parameters will be blocked.
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00105}

epss

{'score': 0.00289}


Thu, 10 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache streampark
CPEs cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache streampark

Fri, 13 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2024-07-16T07:37:38.660Z

Updated: 2024-09-13T17:04:01.780Z

Reserved: 2023-12-31T08:10:56.040Z

Link: CVE-2023-52290

cve-icon Vulnrichment

Updated: 2024-09-13T17:04:01.780Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-16T08:15:02.050

Modified: 2025-07-10T18:18:52.840

Link: CVE-2023-52290

cve-icon Redhat

No data.