Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <10544beb-6e33-1f1d-ab77-0c6e221fd2ac@apache.org>
Date: Mon, 18 Mar 2024 20:02:00 +0000
From: Hans Van Akelyen <hansva@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-24683: Apache Hop Engine: ID isn't escaped when
 generating HTML 

Severity: low

Affected versions:

- Apache Hop Engine before 2.8.0

Description:

Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0.

Users are recommended to upgrade to version 2.8.0, which fixes the issue.

When Hop Server writes links to the PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped.
The variable not properly escaped is the "id", which is not directly accessible by users creating pipelines making the risk of exploiting this low.

This issue only affects users using the Hop Server component and does not directly affect the client.

Credit:

Jonathan Leitschuh (finder)

References:

https://hop.apache.org
https://www.cve.org/CVERecord?id=CVE-2024-24683

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.