Description
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.
This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cf3q-vg8w-mw84 | Apache StreamPipes: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Recovery Token Generation |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache streampipes |
|
| CPEs | cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache streampipes |
Fri, 13 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-13T16:03:11.423Z
Reserved: 2024-03-21T08:24:52.469Z
Link: CVE-2024-29868
Updated: 2024-09-13T16:03:11.423Z
Status : Analyzed
Published: 2024-06-24T10:15:09.387
Modified: 2025-07-15T15:39:09.700
Link: CVE-2024-29868
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:42:37Z
Weaknesses
Github GHSA