← Back to CVEs
CVE-2024-39928
HIGH7.5
Description
In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/25/2024
Last Modified5/16/2025
Sourcenvd
Honeypot Sightings0
Affected Products
apache:linkis
Weaknesses (CWE)
CWE-326CWE-326
References
https://lists.apache.org/thread/g664n13nb17rsogcfrn8kjgd8m89p8nw(security@apache.org)
http://www.openwall.com/lists/oss-security/2024/09/24/2(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.