Lucene search

K
cvelistApacheCVELIST:CVE-2023-27987
HistoryApr 10, 2023 - 7:37 a.m.

CVE-2023-27987 Apache Linkis gateway module token authentication bypass

2023-04-1007:37:07
CWE-326
apache
www.cve.org
apache
linkis
token authentication
bypass
cve-2023-27987
upgrade
version 1.3.2
modify
default token
authorization

9.4 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.2%

In Apache Linkis <=1.3.1,Β due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack.Β Generation rules should add random values.

We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1]
https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Linkis",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "1.3.1",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

9.4 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.2%

Related for CVELIST:CVE-2023-27987