org.apache.streampipes:streampipes-rest@0.93.0 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.streampipes:streampipes-rest package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Server-side Request Forgery (SSRF)

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the configuration of custom endpoints for installing additional pipeline elements. An attacker can manipulate the server to make unauthorized network requests by supplying malicious URLs in the configuration settings.

How to fix Server-side Request Forgery (SSRF)?

Upgrade org.apache.streampipes:streampipes-rest to version 0.95.0 or higher.

[0.93.0,0.95.0)
  • H
Time-of-check Time-of-use (TOCTOU) Race Condition

Affected versions of this package are vulnerable to Time-of-check Time-of-use (TOCTOU) Race Condition during the user self-registration process. An attacker can create multiple identical user accounts by repeatedly requesting account creation with the same email address before it is registered, leading to corruption in user management.

How to fix Time-of-check Time-of-use (TOCTOU) Race Condition?

Upgrade org.apache.streampipes:streampipes-rest to version 0.95.0 or higher.

[0.93.0,0.95.0)
  • H
Unrestricted Upload of File with Dangerous Type

Affected versions of this package are vulnerable to Unrestricted Upload of File with Dangerous Type through the upload functionality. An attacker can execute arbitrary code on the server by uploading malicious files. This is only exploitable if the user is authenticated and authorized.

How to fix Unrestricted Upload of File with Dangerous Type?

Upgrade org.apache.streampipes:streampipes-rest to version 0.95.0 or higher.

[0.93.0,0.95.0)