Lucene search

K
githubGitHub Advisory DatabaseGHSA-4X5H-XMV4-99WX
HistoryJul 06, 2023 - 7:24 p.m.

Apache Linkis Authentication Bypass vulnerability

2023-07-0619:24:13
CWE-294
GitHub Advisory Database
github.com
8
apache linkis
authentication bypass
default token
upgrade
version 1.3.2
token authorization
software

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.005

Percentile

77.1%

In Apache Linkis <=1.3.1,Β due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack.Β Generation rules should add random values.

We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization.

Affected configurations

Vulners
Node
org.apache.linkislinkisRange<1.3.2
VendorProductVersionCPE
org.apache.linkislinkis*cpe:2.3:a:org.apache.linkis:linkis:*:*:*:*:*:*:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.005

Percentile

77.1%

Related for GHSA-4X5H-XMV4-99WX