Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8e637dad-3c59-7108-064b-148c61ab3177@apache.org>
Date: Thu, 22 Jun 2023 20:12:03 +0000
From: Dominik Riemer <riemer@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-31469: Apache StreamPipes: Privilege escalation through
 non-admin user 

Severity: important

Affected versions:

- Apache StreamPipes 0.69.0 through 0.91.0

Description:

A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles.
The issue is resolved by upgrading to StreamPipes 0.92.0.

Credit:

Xun Bai, LJQC Open Source Security Institute (finder)

References:

https://streampipes.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-31469

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.