Improper Input Validation vulnerability in Apache Hop Engine.This issue affects Apache Hop Engine: before 2.8.0. Users are recommended to upgrade to version 2.8.0, which fixes the issue. When Hop Server writes links to the PrepareExecutionPipelineServlet page one of the parameters provided to the user was not properly escaped. The variable not properly escaped is the "id", which is not directly accessible by users creating pipelines making the risk of exploiting this low. This issue only affects users using the Hop Server component and does not directly affect the client.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00243}

epss

{'score': 0.00459}


Tue, 15 Jul 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache hop Engine
CPEs cpe:2.3:a:apache:hop_engine:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache hop Engine

Thu, 21 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2024-03-19T08:20:18.989Z

Updated: 2025-02-13T17:40:17.349Z

Reserved: 2024-01-26T09:22:10.874Z

Link: CVE-2024-24683

cve-icon Vulnrichment

Updated: 2024-08-01T23:28:11.082Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-19T09:15:06.630

Modified: 2025-07-15T13:57:58.503

Link: CVE-2024-24683

cve-icon Redhat

No data.