This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cf3q-vg8w-mw84 | Apache StreamPipes: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Recovery Token Generation |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache streampipes |
|
| CPEs | cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache streampipes |
Fri, 13 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-13T16:03:11.423Z
Reserved: 2024-03-21T08:24:52.469Z
Link: CVE-2024-29868
Updated: 2024-09-13T16:03:11.423Z
Status : Analyzed
Published: 2024-06-24T10:15:09.387
Modified: 2025-07-15T15:39:09.700
Link: CVE-2024-29868
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:42:37Z
Github GHSA