First published: Tue Jul 16 2024(Updated: )
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installation process of pipeline elements. Previously, StreamPipes allowed users to configure custom endpoints from which to install additional pipeline elements. These endpoints were not properly validated, allowing an attacker to get StreamPipes to send an HTTP GET request to an arbitrary address. This issue affects Apache StreamPipes: through 0.93.0. Users are recommended to upgrade to version 0.95.0, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache StreamPipes | <0.95.0 | |
maven/org.apache.streampipes:streampipes-parent | <0.95.0 | 0.95.0 |
pip/streampipes | <0.95.0 | 0.95.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31979 is classified as a Server-Side Request Forgery (SSRF) vulnerability which can lead to unauthorized access and exploitation of the server.
To remediate CVE-2024-31979, upgrade Apache StreamPipes to version 0.95.0 or later.
Versions of Apache StreamPipes prior to 0.95.0 are affected by CVE-2024-31979.
CVE-2024-31979 may allow attackers to control the server's behavior by sending crafted requests, potentially leading to data leakage.
Yes, CVE-2024-31979 affects the installation process of pipeline elements in Apache StreamPipes.