Apache Software Foundation Apache Submarine vulnerabilities

3 known vulnerabilities affecting apache_software_foundation/apache_submarine.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH1

Vulnerabilities

Page 1 of 1
CVE-2023-37924CRITICALCVSS 9.8≥ 0.7.0, < 0.8.02023-11-22
CVE-2023-37924 [CRITICAL] CWE-89 CVE-2023-37924: Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a user logs in. Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a user logs in. This issue can result in unauthorized login. Now we have fixed this issue and now user must have the correct login to access workbench. This issue affects Apache Submarine: from 0.7.0 before 0.8.0. We recommend that all submarine users with 0.7.0 upgr
cvelistv5nvd
CVE-2023-46302HIGHCVSS 8.3≥ 0.7.0, < 0.8.02023-11-20
CVE-2023-46302 [HIGH] CWE-502 Apache Submarine: Fix CVE-2022-1471 SnakeYaml unsafe deserialization Apache Submarine: Fix CVE-2022-1471 SnakeYaml unsafe deserialization Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 . Apache Submarine uses JAXRS to define REST endpoints. In order to handle YAML requests (using application/yaml content-type), it defines a YamlEntityProvider entity
cvelistv5
CVE-2022-1471CRITICALCVSS 9.8≥ 0.7.0, < 0.8.02022-12-01
CVE-2022-1471 [HIGH] CWE-20 CVE-2022-1471: SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserializa SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
nvd