On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability.
Mitigation:
all users should upgrade to 2.1.4
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/18/1 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/n6dhnl68knpxy80t35qxkkw2691l8sfn | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/07/18/1 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/n6dhnl68knpxy80t35qxkkw2691l8sfn | Mailing List Vendor Advisory |
Configurations
History
13 Feb 2025, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users should upgrade to 2.1.4 |
Information
Published : 2024-07-18 12:15
Updated : 2025-02-13 18:17
NVD link : CVE-2024-29178
Mitre link : CVE-2024-29178
CVE.ORG link : CVE-2024-29178
JSON object : View
Products Affected
apache
- streampark
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')