|
Message-ID: <10544beb-6e33-1f1d-ab77-0c6e221fd2ac@apache.org> Date: Mon, 18 Mar 2024 20:02:00 +0000 From: Hans Van Akelyen <hansva@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-24683: Apache Hop Engine: ID isn't escaped when generating HTML Severity: low Affected versions: - Apache Hop Engine before 2.8.0 Description: Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0. Users are recommended to upgrade to version 2.8.0, which fixes the issue. When Hop Server writes links to the PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped. The variable not properly escaped is the "id", which is not directly accessible by users creating pipelines making the risk of exploiting this low. This issue only affects users using the Hop Server component and does not directly affect the client. Credit: Jonathan Leitschuh (finder) References: https://hop.apache.org https://www.cve.org/CVERecord?id=CVE-2024-24683
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.