Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.
This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/g7t7zctvq2fysrw1x17flnc12592nhx7 | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/06/22/1 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/g7t7zctvq2fysrw1x17flnc12592nhx7 | Mailing List Vendor Advisory |
Configurations
History
15 Jul 2025, 15:39
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache
Apache streampipes |
|
CPE | cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:* | |
References | () https://lists.apache.org/thread/g7t7zctvq2fysrw1x17flnc12592nhx7 - Mailing List, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/06/22/1 - Mailing List, Third Party Advisory |
Information
Published : 2024-06-24 10:15
Updated : 2025-07-15 15:39
NVD link : CVE-2024-29868
Mitre link : CVE-2024-29868
CVE.ORG link : CVE-2024-29868
JSON object : View
Products Affected
apache
- streampipes
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)