Описание
Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.
An old session can be used by an attacker even after the user has been deleted or the password has been changed.
Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 , https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884 to solve it.
Ссылки
- Mailing ListVendor Advisory
- Mailing ListVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.4.0 (включая) до 1.6.0 (включая)
cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*
EPSS
Процентиль: 39%
0.00171
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-613
Связанные уязвимости
CVSS3: 9.1
github
больше 2 лет назад
Apache InLong Insufficient Session Expiration vulnerability
EPSS
Процентиль: 39%
0.00171
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-613