Apache Linkis gateway module token authentication bypass
CVE-2023-27987
9.1CRITICAL
Summary
In Apache Linkis versions up to and including 1.3.1, the default token generated during Linkis Gateway deployment exhibits insufficient complexity, making it susceptible to unauthorized access. Attackers can exploit this vulnerability by easily obtaining the default token. To enhance security, it is crucial to upgrade to version 1.3.2 and modify the default token to include randomized elements, following the guidelines provided in the Token authorization documentation. This proactive approach will help safeguard your systems against potential attacks.
Affected Version(s)
Apache Linkis 0 <= 1.3.1
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Laihan