Apache SeaTunnel: Unauthenticated insecure access
Low severity
GitHub Reviewed
Published
Jun 19, 2025
to the GitHub Advisory Database
•
Updated Jun 19, 2025
Description
Published by the National Vulnerability Database
Jun 19, 2025
Published to the GitHub Advisory Database
Jun 19, 2025
Reviewed
Jun 19, 2025
Last updated
Jun 19, 2025
Summary
Unauthorized users can perform Arbitrary File Read and Deserialization
attack by submit job using restful api-v1.
Details
Unauthorized users can access
/hazelcast/rest/maps/submit-job
to submitjob.
An attacker can set extra params in mysql url to perform Arbitrary File
Read and Deserialization attack.
This issue affects Apache SeaTunnel: <=2.3.10
Fixed
Users are recommended to upgrade to version 2.3.11, and enable restful api-v2 & open https two-way authentication , which fixes the issue.
References