CVE-2023-48396: Apache SeaTunnel Web Authentication vulnerability
8.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37421%
CWE
Published
7/30/2024
Updated
8/9/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.seatunnel:seatunnel-web | maven | < 1.0.1 | 1.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the hardcoded JWT secretKey in application.yml. While specific function names are not explicitly provided in the commit or descriptions, the presence of a static secret in the configuration directly impacts all JWT-related functions that rely on this key. The commit fixes this by removing the hardcoded value, confirming that the key's presence in the configuration enabled the exploit. Standard JWT implementations use the secretKey for token signing/validation, so any functions handling these operations would inherit the vulnerability.