Skip to content

Commit ae0e2c6

Browse files
1 parent 2f52557 commit ae0e2c6

File tree

3 files changed

+130
-35
lines changed

3 files changed

+130
-35
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3hg2-rh4r-8qf6",
4+
"modified": "2025-12-12T20:19:56Z",
5+
"published": "2025-12-12T18:30:35Z",
6+
"aliases": [
7+
"CVE-2025-53960"
8+
],
9+
"summary": "Apache StreamPark: Use the user’s password as the secret key Vulnerability",
10+
"details": "When encrypting sensitive data, weak encryption keys that are fixed or directly generated based on user passwords are used. Attackers can obtain these keys through methods such as reverse engineering, code leaks, or password guessing, thereby decrypting stored or transmitted encrypted data, leading to the leakage of sensitive information.\n\nThis issue affects Apache StreamPark: from 2.0.0 before 2.1.7.\n\nUsers are recommended to upgrade to version 2.1.7, which fixes the issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.apache.streampark:streampark"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.0.0"
29+
},
30+
{
31+
"fixed": "2.1.7"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53960"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/apache/streampark/commit/39034db0c806168afa82e58e4f376e1e3c3b73e4"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/apache/streampark"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://lists.apache.org/thread/xlpvfzf5l5m5mfyjwrz5h4dssm3c32vy"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "http://www.openwall.com/lists/oss-security/2025/12/04/1"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-1240"
63+
],
64+
"severity": "HIGH",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2025-12-12T20:19:56Z",
67+
"nvd_published_at": "2025-12-12T16:15:44Z"
68+
}
69+
}
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-55jh-84jv-8mx8",
4+
"modified": "2025-12-12T20:20:34Z",
5+
"published": "2025-12-12T20:20:34Z",
6+
"aliases": [
7+
"CVE-2025-67750"
8+
],
9+
"summary": "Lightning Flow Scanner Vulnerable to Code Injection via Unsafe Use of `new Function()` in APIVersion Rule",
10+
"details": "### Impact\nThe APIVersion rule uses `new Function()` to evaluate expression strings. A malicious crafted flow metadata file can cause arbitrary JavaScript execution during scanning. An attacker could execute arbitrary JavaScript during a scan by supplying a malicious expression within rule configuration or crafted flow metadata. This could compromise developer machines, CI runners, or editor environments.\n\n### Patches\nThe patch removes all uses of `new Function()` and replaces them with a safer parser. It now validates operators (`>`, >=`, `<`, `<=`, `==`) and performs numeric comparisons without evaluating untrusted JavaScript.\n**version:** core-v6.10.6,\n**version vsx:**: v2.4.4\n\n### Work around\n\n```\n// --- Handle APIVersion rule separately to avoid unsafe-eval in the core library ---\n const apiVersionConfig = ruleConfig.rules.APIVersion;\n if (apiVersionConfig) {\n delete ruleConfig.rules.APIVersion;\n }\n\n// Manually evaluate the APIVersion rule, if it was configured.\n if (apiVersionConfig) {\n const flowApiVer = this.currentFlow.apiVersion || this.currentFlow.xmlData?.apiVersion;\n const apiVersionRuleDef = allRules.find(r => r.name === \"APIVersion\");\n\n // Determine the required expression (e.g. \">=58\").\n let requiredExpr;\n if (apiVersionConfig.expression) {\n requiredExpr = apiVersionConfig.expression;\n } else if (apiVersionConfig.threshold != null) {\n requiredExpr = `>=${apiVersionConfig.threshold}`;\n }\n\n if (requiredExpr) {\n const minVer = parseInt(requiredExpr.replace(/[^0-9]/g, \"\"), 10);\n const operator = requiredExpr.replace(/[0-9]/g, \"\").trim();\n const operators = {\n \">=\": (a, b) => a < b,\n \"<\": (a, b) => a >= b,\n \">\": (a, b) => a <= b,\n \"<=\": (a, b) => a > b,\n \"==\": (a, b) => a !== b,\n \"=\": (a, b) => a !== b\n };\n const violation = operators[operator] ? operators[operator](flowApiVer, minVer) : flowApiVer < minVer;\n\n if (violation) {\n // Craft a result object that mimics the core scanner output so downstream logic remains unchanged.\n const manualScanResult = [{\n flow: parsedFlow,\n ruleResults: [{\n ruleName: \"APIVersion\",\n ruleDefinition: {\n description: apiVersionRuleDef?.description || \"API Version check\",\n label: apiVersionRuleDef?.label || \"APIVersion\"\n },\n occurs: true,\n severity: apiVersionConfig.severity,\n details: [{\n name: String(flowApiVer),\n type: \"apiVersion\",\n expression: requiredExpr\n }]\n }]\n }];\n results.push(...this.processScanResults(manualScanResult));\n }\n }\n }\n\n```",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "lightning-flow-scanner"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "6.10.6"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/Flow-Scanner/lightning-flow-scanner/security/advisories/GHSA-55jh-84jv-8mx8"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/Flow-Scanner/lightning-flow-scanner/commit/10f64a5eb193d8a777e453b25e910144e4540795"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/Flow-Scanner/lightning-flow-scanner"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-94"
55+
],
56+
"severity": "HIGH",
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2025-12-12T20:20:34Z",
59+
"nvd_published_at": null
60+
}
61+
}

advisories/unreviewed/2025/12/GHSA-3hg2-rh4r-8qf6/GHSA-3hg2-rh4r-8qf6.json

Lines changed: 0 additions & 35 deletions
This file was deleted.

0 commit comments

Comments
 (0)