GHSA-4x5h-xmv4-99wx

Suggest an improvement
Source
https://github.com/advisories/GHSA-4x5h-xmv4-99wx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-4x5h-xmv4-99wx/GHSA-4x5h-xmv4-99wx.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-4x5h-xmv4-99wx
Aliases
Published
2023-07-06T19:24:13Z
Modified
2024-10-18T16:30:49.237824Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Apache Linkis Authentication Bypass vulnerability
Details

In Apache Linkis <=1.3.1, due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack. Generation rules should add random values.

We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization.

Database specific
{
    "nvd_published_at": "2023-04-10T08:15:00Z",
    "cwe_ids": [
        "CWE-294",
        "CWE-326"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-06T22:04:03Z"
}
References

Affected packages

Maven / org.apache.linkis:linkis

Package

Name
org.apache.linkis:linkis
View open source insights on deps.dev
Purl
pkg:maven/org.apache.linkis/linkis

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2

Affected versions

1.*

1.0.3
1.1.0
1.1.1
1.1.2
1.1.3
1.2.0
1.3.0
1.3.1