Improper Input Validation Affecting org.apache.hop:hop-engine package, versions [,2.8.0)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEHOP-6468188
  • published20 Mar 2024
  • disclosed19 Mar 2024
  • creditJonathan Leitschuh

Introduced: 19 Mar 2024

CVE-2024-24683  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade org.apache.hop:hop-engine to version 2.8.0 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation due to the PrepareExecutionPipelineServlet page not properly escaping one of the parameters provided to the user. The variable not properly escaped is the id, which is not directly accessible by users creating pipelines, making the risk of exploiting this low. This issue only affects users using the Hop Server component and does not directly affect the client.

CVSS Scores

version 3.1