First published: Fri Jun 23 2023(Updated: )
A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles. The issue is resolved by upgrading to StreamPipes 0.92.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
>=0.69.0<=0.91.0 | ||
Apache StreamPipes | >=0.69.0<=0.91.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31469 has been classified with a severity that indicates it poses a significant security risk due to unauthorized privilege escalation.
To fix CVE-2023-31469, update Apache StreamPipes to version 0.91.1 or later.
Users of Apache StreamPipes versions 0.69.0 to 0.91.0 are affected by CVE-2023-31469.
CVE-2023-31469 is a privilege escalation vulnerability due to inadequate access control in the REST interface of Apache StreamPipes.
Yes, CVE-2023-31469 can be exploited by non-admin users with valid login credentials.