Exploit for CVE-2024-29868
Discription

CVE-2024-29868: Use of Cryptographically Weak PRNG in Recovery Token Generation This repository contains the proof of concept related to CVE-2024-29868 that affects Apache StreamPipes from v0.69.0 through 0.93.0. Description: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account. This POC demonstrate how it's possible to take over the admin account of the affected application. Repository Structure: The /lab-setup directory contains the necessary files to spin up a local testing environment where it's possible to reproduce the vulnerabilility: docker-compose.yml file with all the necessary services. .env environment variables file. The /detection directory contains 2 Project Discovery's Nuclei templates: apache-streampipes-detect.yaml: template to detect Apache StreamPipes installations. CVE-2024-29868.yaml: template to identify CVE-2024-29868 vulnerability. The /exploitation directory contains the code to compile the cracker and instructions on how to use it. Clone this repository and follow the README.md instructions in the respective directories. Resources & References: https://lists.apache.org/thread/zqn5z48gz7bp0q8ctk96ht8bc7vd3njv https://vulners.com/cve/CVE-2024-29868 https://labs.yarix.com/2024/06/cve-2024-29868/ …Read More

Back to Main

Subscribe for the latest news: