{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T12:02:47.432","vulnerabilities":[{"cve":{"id":"CVE-2023-37924","sourceIdentifier":"security@apache.org","published":"2023-11-22T10:15:07.577","lastModified":"2024-11-21T08:12:28.930","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a user logs in. This issue can result in unauthorized login.\nNow we have fixed this issue and now user must have the correct login to access workbench.\nThis issue affects Apache Submarine: from 0.7.0 before 0.8.0. We recommend that all submarine users with 0.7.0 upgrade to 0.8.0, which not only fixes the issue, supports the oidc authentication mode, but also removes the case of unauthenticated logins.\nIf using the version lower than 0.8.0 and not want to upgrade, you can try cherry-pick PR  https://github.com/apache/submarine/pull/1037 https://github.com/apache/submarine/pull/1054  and rebuild the submarine-server image to fix this.\n\n"},{"lang":"es","value":"Apache Software Foundation Apache Submarine tiene una vulnerabilidad de inyección SQL cuando un usuario inicia sesión. Este problema puede provocar un inicio de sesión no autorizado. Ahora hemos solucionado este problema y ahora el usuario debe tener el inicio de sesión correcto para acceder al banco de trabajo. Este problema afecta a Apache Submarine: desde 0.7.0 antes de 0.8.0. Recomendamos que todos los usuarios de Submarine con 0.7.0 actualicen a 0.8.0, que no solo soluciona el problema, admite el modo de autenticación oidc, sino que también elimina el caso de inicios de sesión no autenticados. Si utiliza una versión inferior a 0.8.0 y no desea actualizar, puede probar PR https://github.com/apache/submarine/pull/1037 https://github.com/apache/submarine/pull /1054 y reconstruir la imagen del servidor submarino para solucionar este problema."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:submarine:*:*:*:*:*:*:*:*","versionStartIncluding":"0.7.0","versionEndExcluding":"0.8.0","matchCriteriaId":"5227C744-A013-4BBA-945F-E7BCE19AA4B8"}]}]}],"references":[{"url":"https://github.com/apache/submarine/pull/1037","source":"security@apache.org","tags":["Issue Tracking"]},{"url":"https://issues.apache.org/jira/browse/SUBMARINE-1361","source":"security@apache.org","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://lists.apache.org/thread/g99h773vd49n1wyghdq1llv2f83w1b3r","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"https://github.com/apache/submarine/pull/1037","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://issues.apache.org/jira/browse/SUBMARINE-1361","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://lists.apache.org/thread/g99h773vd49n1wyghdq1llv2f83w1b3r","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]}]}}]}