{"id":"CVE-2023-48396","details":"Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is hardcoded in the application, an attacker can forge\nany token to log in any user.\n\nAttacker can get secret key in /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token.\nThis issue affects Apache SeaTunnel: 1.0.0.\n\nUsers are recommended to upgrade to version 1.0.1, which fixes the issue.","aliases":["GHSA-cp2c-x2pc-fph7"],"modified":"2026-04-12T09:35:58.993766Z","published":"2024-07-30T09:15:02.540Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2024/07/30/1"},{"type":"ADVISORY","url":"https://lists.apache.org/thread/1tdxfjksx0vb9gtyt77wlr6rdcy1qwmw"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/seatunnel","events":[{"introduced":"0"},{"last_affected":"8e40a43328b06ca594c8892fdff66f5197be167b"}],"database_specific":{"cpe":"cpe:2.3:a:apache:seatunnel:1.0.0:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.0.0"}],"source":"CPE_FIELD"}}],"versions":["v1.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-48396.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}