2024-03-19 13:03:25 +00:00

36 lines
1.9 KiB
JSON

{
"id": "CVE-2024-24683",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-19T09:15:06.630",
"lastModified": "2024-03-19T09:15:06.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0.\n\nUsers are recommended to upgrade to version 2.8.0, which fixes the issue.\n\nWhen Hop Server writes links to the\u00a0PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped.\nThe variable not properly escaped is the \"id\", which is not directly accessible by users creating pipelines making the risk of exploiting this low.\n\nThis issue only affects users using the Hop Server component and does not directly affect the client."
},
{
"lang": "es",
"value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Hop Engine. Este problema afecta a Apache Hop Engine: anterior a 2.8.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.8.0, que soluciona el problema. Cuando Hop Server escribe enlaces a la p\u00e1gina PrepareExecutionPipelineServlet, uno de los par\u00e1metros proporcionados al usuario no se escap\u00f3 correctamente. La variable que no se escap\u00f3 correctamente es la \"id\", a la que los usuarios que crean canalizaciones no pueden acceder directamente, lo que hace que el riesgo de explotaci\u00f3n sea bajo. Este problema solo afecta a los usuarios que utilizan el componente Hop Server y no afecta directamente al cliente."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t",
"source": "security@apache.org"
}
]
}