CVE-2024-24683

Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0. Users are recommended to upgrade to version 2.8.0, which fixes the issue. When Hop Server writes links to the PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped. The variable not properly escaped is the "id", which is not directly accessible by users creating pipelines making the risk of exploiting this low. This issue only affects users using the Hop Server component and does not directly affect the client.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/03/18/1 Mailing List Third Party Advisory
https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t Mailing List Vendor Advisory Issue Tracking
http://www.openwall.com/lists/oss-security/2024/03/18/1 Mailing List Third Party Advisory
https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t Mailing List Vendor Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hop_engine:*:*:*:*:*:*:*:*

History

15 Jul 2025, 13:57

Type Values Removed Values Added
First Time Apache
Apache hop Engine
References () http://www.openwall.com/lists/oss-security/2024/03/18/1 - () http://www.openwall.com/lists/oss-security/2024/03/18/1 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t - () https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t - Mailing List, Vendor Advisory, Issue Tracking
CPE cpe:2.3:a:apache:hop_engine:*:*:*:*:*:*:*:*

Information

Published : 2024-03-19 09:15

Updated : 2025-07-15 13:57


NVD link : CVE-2024-24683

Mitre link : CVE-2024-24683

CVE.ORG link : CVE-2024-24683


JSON object : View

Products Affected

apache

  • hop_engine
CWE
CWE-20

Improper Input Validation