org.apache.storm:storm-server@2.1.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.storm:storm-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Exposure of Sensitive Information to an Unauthorized Actor

org.apache.storm:storm-server is a distributed realtime computation system.

Affected versions of this package are vulnerable to Exposure of Sensitive Information to an Unauthorized Actor via the File.createTempFile method. A local attacker can read sensitive information by accessing the temporary file created in the system's temporary directory.

Note:

This is only exploitable if 'java.io.tmpdir' system property is not explicitly set and 'ui.disable.spout.lag.monitoring' is set to false. Also, the impact is limited as the temporary file gets deleted soon after its creation.

This vulnerability does not impact modern MacOS Operating Systems.

How to fix Exposure of Sensitive Information to an Unauthorized Actor?

Upgrade org.apache.storm:storm-server to version 2.6.0 or higher.

[2.0.0,2.6.0)
  • C
Arbitrary Command Injection

org.apache.storm:storm-server is a distributed realtime computation system.

Affected versions of this package are vulnerable to Arbitrary Command Injection which exists in the getTopologyHistory service of the package. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.

How to fix Arbitrary Command Injection?

Upgrade org.apache.storm:storm-server to version 2.2.1, 2.1.1, 1.2.4 or higher.

[2.2.0,2.2.1) [2.1.0,2.1.1) [1.0.0,1.2.4)
  • C
Deserialization of Untrusted Data

org.apache.storm:storm-server is a distributed realtime computation system.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data which exists in the worker services of the package. This, allowing pre-auth Remote Code Execution (RCE).

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.storm:storm-server to version 2.2.1, 2.1.1, 1.2.4 or higher.

[2.2.0,2.2.1) [2.1.0,2.1.1) [1.0.0,1.2.4)