Apache Hop Security Vulnerabilities
Security Vulnerabilities
Please note that binary patches are not produced for individual vulnerabilities. To obtain the binary fix for a particular vulnerability you should upgrade to an Apache Hop version where that vulnerability has been fixed.
For more information about reporting vulnerabilities, see the Apache Security Team page.
Known Vulnerabilities
CVE-2024-24683: fixed in Apache Hop 2.8.0.
Check the Apache Hop security advisories page for more details.
With great power comes great responsibility
The Apache Hop platform allows data engineers and data developers to perform some very powerful operations.
With great power comes great responsibility: the various transforms and actions allow you to perform potentially destructive operations on your databases, file systems and other areas of your data architecture. Make sure you have the proper permissions and restrictions in place to avoid unwanted operations.
In addition to these permissions and restrictions, unwanted plugins can be removed from Apache Hop by removing the corresponding folder from the <HOP>/plugins
folder. For example, to remove the Delete files
action, delete the <HOP>/plugins/actions/deletefiles/
folder from your Hop installation.