CVE-2024-29868

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29868
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-29868.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-29868
Aliases
Published
2024-06-24T10:15:09Z
Modified
2025-07-16T23:50:13.044666Z
Summary
[none]
Details

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account. This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.

Users are recommended to upgrade to version 0.95.0, which fixes the issue.

References

Affected packages

Git / github.com/apache/streampipes

Affected ranges

Type
GIT
Repo
https://github.com/apache/streampipes
Events

Affected versions

release/0.*

release/0.69.0
release/0.93.0