First published: Tue Jul 16 2024(Updated: )
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in user self-registration. This allows an attacker to potentially request the creation of multiple accounts with the same email address until the email address is registered, creating many identical users and corrupting StreamPipe's user management. This issue affects Apache StreamPipes: through 0.93.0. Users are recommended to upgrade to version 0.95.0, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache StreamPipes | <0.95.0 | |
pip/streampipes | <0.95.0 | 0.95.0 |
maven/org.apache.streampipes:streampipes-parent | <0.95.0 | 0.95.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30471 is considered a moderate severity vulnerability due to its potential impact on user account creation.
To fix CVE-2024-30471, upgrade Apache StreamPipes to version 0.95.0 or later.
CVE-2024-30471 is a Time-of-check Time-of-use (TOCTOU) race condition vulnerability affecting user self-registration.
CVE-2024-30471 affects users of Apache StreamPipes versions prior to 0.95.0.
Yes, CVE-2024-30471 allows attackers to create multiple accounts using the same email address, leading to potential abuse.