XiaoYou201 opened a new issue, #10145:
URL: https://github.com/apache/inlong/issues/10145

   ### Description
   
   Applications that use UriComponentsBuilder to parse an externally provided 
URL (e.g. through a query parameter)
   AND perform validation checks on the host of the parsed URL may be 
vulnerable to a open redirect 
https://cwe.mitre.org/data/definitions/601.htmlattack or to a SSRF attack if 
the URL is used after passing validation checks.
   
   This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 
and CVE-2024-22243
   https://spring.io/security/cve-2024-22243, but with different input.
   
   this issue was fixed in 5.3.34, bump to this version could solve this.
   
   ### InLong Component
   
   InLong Manager
   
   ### Are you willing to submit PR?
   
   - [X] Yes, I am willing to submit a PR!
   
   ### Code of Conduct
   
   - [X] I agree to follow this project's [Code of 
Conduct](https://www.apache.org/foundation/policies/conduct)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@inlong.apache.org.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to