CVE-2023-52290

In streampark-console the list pages(e.g: application pages), users can sort page by field. This sort field is sent from the front-end to the back-end, and the SQL query is generated using this field. However, because this sort field isn't validated, there is a risk of SQL injection vulnerability. The attacker must successfully log into the system to launch an attack, which may cause data leakage. Since no data will be written, so this is a low-impact vulnerability. Mitigation: all users should upgrade to 2.1.4, Such parameters will be blocked.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*

History

10 Jul 2025, 18:18

Type Values Removed Values Added
First Time Apache streampark
Apache
CPE cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*
CWE CWE-89
References
  • () http://www.openwall.com/lists/oss-security/2024/07/15/4 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/t3mcm8pb65d9gj3wrgtj9sx9s2pfvvl3 - () https://lists.apache.org/thread/t3mcm8pb65d9gj3wrgtj9sx9s2pfvvl3 - Mailing List, Vendor Advisory

16 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 08:15

Updated : 2025-07-10 18:18


NVD link : CVE-2023-52290

Mitre link : CVE-2023-52290


JSON object : View

Products Affected

apache

  • streampark
CWE

No CWE.