CVE-2024-24683

Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0. Users are recommended to upgrade to version 2.8.0, which fixes the issue. When Hop Server writes links to the PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped. The variable not properly escaped is the "id", which is not directly accessible by users creating pipelines making the risk of exploiting this low. This issue only affects users using the Hop Server component and does not directly affect the client.
CVSS

No CVSS.

References
Link Resource
http://www.openwall.com/lists/oss-security/2024/03/18/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/18/1 Mailing List Third Party Advisory
https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t Mailing List Vendor Advisory Issue Tracking
https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t Mailing List Vendor Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hop_engine:*:*:*:*:*:*:*:*

History

15 Jul 2025, 13:57

Type Values Removed Values Added
CPE cpe:2.3:a:apache:hop_engine:*:*:*:*:*:*:*:*
First Time Apache hop Engine
Apache
References () https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t - () https://lists.apache.org/thread/ts203zssv1n9qth1wdlhk2bhos3vcq6t - Mailing List, Vendor Advisory, Issue Tracking
References () http://www.openwall.com/lists/oss-security/2024/03/18/1 - () http://www.openwall.com/lists/oss-security/2024/03/18/1 - Mailing List, Third Party Advisory

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/03/18/1 -

19 Mar 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-19 09:15

Updated : 2025-07-15 13:57


NVD link : CVE-2024-24683

Mitre link : CVE-2024-24683


JSON object : View

Products Affected

apache

  • hop_engine
CWE

No CWE.