{"id":"CVE-2024-29868","details":"Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.\nThis allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.\nThis issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n","aliases":["GHSA-cf3q-vg8w-mw84"],"modified":"2026-04-09T10:06:03.807414Z","published":"2024-06-24T10:15:09.387Z","references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/g7t7zctvq2fysrw1x17flnc12592nhx7"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2024/06/22/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/streampipes","events":[{"introduced":"952c51b2d6f76648a349167e97be2b8c30783dc5"},{"last_affected":"39d9986f41b93dbe9060c38b05ccf74e8e349ff6"}],"database_specific":{"versions":[{"introduced":"0.69.0"},{"last_affected":"0.93.0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-29868.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}