Skip to content

Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0

Notifications You must be signed in to change notification settings

DEVisions/CVE-2024-29868

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-29868: Use of Cryptographically Weak PRNG in Recovery Token Generation

cover

This repository contains the proof of concept related to CVE-2024-29868 that affects Apache StreamPipes from v0.69.0 through 0.93.0. Description: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account. This POC demonstrate how it's possible to take over the admin account of the affected application.

Repository Structure:

  • The /lab-setup directory contains the necessary files to spin up a local testing environment where it's possible to reproduce the vulnerabilility:
    • docker-compose.yml file with all the necessary services.
    • .env environment variables file.
  • The /detection directory contains 2 Project Discovery's Nuclei templates:
    • apache-streampipes-detect.yaml: template to detect Apache StreamPipes installations.
    • CVE-2024-29868.yaml: template to identify CVE-2024-29868 vulnerability.
  • The /exploitation directory contains the code to compile the cracker and instructions on how to use it.

Clone this repository and follow the README.md instructions in the respective directories.

Resources & References:

About

Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages