Lucene search

K
cvelistApacheCVELIST:CVE-2023-27987
HistoryApr 10, 2023 - 7:37 a.m.

CVE-2023-27987 Apache Linkis gateway module token authentication bypass

2023-04-1007:37:07
CWE-326
apache
www.cve.org
4
apache
linkis
token authentication
bypass
cve-2023-27987
upgrade
version 1.3.2
modify
default token
authorization

AI Score

9.4

Confidence

High

EPSS

0.005

Percentile

77.1%

In Apache Linkis <=1.3.1,Β due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack.Β Generation rules should add random values.

We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1]
https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Linkis",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "1.3.1",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

AI Score

9.4

Confidence

High

EPSS

0.005

Percentile

77.1%

Related for CVELIST:CVE-2023-27987