Логотип exploitDog
bind:CVE-2023-27987
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-27987

Количество 2

Количество 2

nvd логотип

CVE-2023-27987

почти 3 года назад

In Apache Linkis <=1.3.1, due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack. Generation rules should add random values. We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1] https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-4x5h-xmv4-99wx

больше 2 лет назад

Apache Linkis Authentication Bypass vulnerability

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-27987

In Apache Linkis <=1.3.1, due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack. Generation rules should add random values. We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1] https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token

CVSS3: 9.1
0%
Низкий
почти 3 года назад
github логотип
GHSA-4x5h-xmv4-99wx

Apache Linkis Authentication Bypass vulnerability

CVSS3: 9.1
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу