First published: Tue Jul 16 2024(Updated: )
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such a dangerous type might be an executable file that may lead to a remote code execution (RCE). The unrestricted upload is only possible for authenticated and authorized users. This issue affects Apache StreamPipes: through 0.93.0. Users are recommended to upgrade to version 0.95.0, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.streampipes:streampipes-parent | <0.95.0 | 0.95.0 |
Apache StreamPipes | <0.95.0 | |
pip/streampipes | <0.95.0 | 0.95.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31411 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-31411, upgrade Apache StreamPipes to version 0.95.0 or later.
CVE-2024-31411 is caused by an unrestricted upload of files with dangerous types, such as executable files.
CVE-2024-31411 affects authenticated and authorized users of Apache StreamPipes versions prior to 0.95.0.
The consequences of CVE-2024-31411 include the potential for an attacker to execute arbitrary code on the server.