Description
On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability.

Mitigation:

all users should upgrade to 2.1.4
Published: 2024-07-18
Score: 8.8 High
EPSS: 6.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-26211 On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users should upgrade to 2.1.4
Github GHSA Github GHSA GHSA-vv8h-m63v-53pq Apache StreamPark: FreeMarker SSTI RCE Vulnerability
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01297}

epss

{'score': 0.01753}


Thu, 13 Feb 2025 18:00:00 +0000

Type Values Removed Values Added
Description On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users should upgrade to 2.1.4 On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users should upgrade to 2.1.4

Tue, 10 Sep 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache streampark
CPEs cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache streampark

Subscriptions

Apache Streampark
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-13T17:47:39.338Z

Reserved: 2024-03-18T16:34:46.011Z

Link: CVE-2024-29178

cve-icon Vulnrichment

Updated: 2024-08-02T01:10:54.085Z

cve-icon NVD

Status : Modified

Published: 2024-07-18T12:15:02.960

Modified: 2025-02-13T18:17:50.040

Link: CVE-2024-29178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses