← Zuruck zu CVEs
CVE-2024-39928
HIGH7.5
Beschreibung
In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht9/25/2024
Zuletzt geandert5/16/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apache:linkis
Schwachen (CWE)
CWE-326CWE-326
Referenzen
https://lists.apache.org/thread/g664n13nb17rsogcfrn8kjgd8m89p8nw(security@apache.org)
http://www.openwall.com/lists/oss-security/2024/09/24/2(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.