Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-27987


In Apache Linkis <=1.3.1, due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack. Generation rules should add random values. We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1] https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token


Published

2023-04-10T08:15:07.180

Last Modified

2024-11-21T07:53:52.747

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.1 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-326
  • Type: Secondary
    CWE-326

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache linkis ≤ 1.3.1 Yes

References