CVE-2022-45802

9.8 CRITICAL

📋 TL;DR

This vulnerability in Apache StreamPark allows any user to upload arbitrary JAR files without proper file type validation, potentially enabling remote code execution. Attackers could upload malicious files to any directory, compromising the server. All users of affected versions are at risk.

💻 Affected Systems

Products:
  • Apache StreamPark
Versions: Versions before 2.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with file upload functionality enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, allowing attackers to execute arbitrary commands, steal data, or deploy ransomware.

🟠

Likely Case

Attackers upload malicious JAR files to execute arbitrary code, potentially gaining shell access or deploying backdoors.

🟢

If Mitigated

With proper file validation and restricted upload directories, impact is limited to denial of service or minor data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user authentication but any authenticated user can exploit it. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apache StreamPark 2.0.0 or later

Vendor Advisory: https://lists.apache.org/thread/thwl1v2h6r3c21x1qwff08o57qzjnst6

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Apache StreamPark 2.0.0 or later from official sources. 3. Stop the current StreamPark service. 4. Replace with patched version. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable the vulnerable file upload feature until patching is possible.

Modify application configuration to disable 'application.upload.enabled' or similar settings

Implement file type validation

all

Add server-side validation to only accept specific file types and extensions.

Implement file extension whitelisting in upload handler code

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate StreamPark instances from critical systems
  • Deploy web application firewall (WAF) with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check StreamPark version via web interface or configuration files. Versions before 2.0.0 are vulnerable.

Check Version:

Check application.properties or web interface for version information

Verify Fix Applied:

After upgrade, verify version is 2.0.0 or later and test file upload functionality with invalid file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with non-standard extensions
  • Multiple failed upload attempts
  • JAR file uploads from unexpected users

Network Indicators:

  • Unusual outbound connections from StreamPark server
  • File upload requests with suspicious payloads

SIEM Query:

source="streampark" AND (event="file_upload" AND file_extension!="jar") OR (event="execution" AND process="java")

🔗 References

📤 Share & Export