Apache Linkis gateway module token authentication bypass
CVE-2023-27987

9.1CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
10 April 2023

Summary

In Apache Linkis versions up to and including 1.3.1, the default token generated during Linkis Gateway deployment exhibits insufficient complexity, making it susceptible to unauthorized access. Attackers can exploit this vulnerability by easily obtaining the default token. To enhance security, it is crucial to upgrade to version 1.3.2 and modify the default token to include randomized elements, following the guidelines provided in the Token authorization documentation. This proactive approach will help safeguard your systems against potential attacks.

Affected Version(s)

Apache Linkis 0 <= 1.3.1

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Laihan
.