In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue.
History

Tue, 24 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache Software Foundation
Apache Software Foundation apache Linkis Spark Engineconn
CPEs cpe:2.3:a:apache_software_foundation:apache_linkis_spark_engineconn:*:*:*:*:*:*:*:*
Vendors & Products Apache Software Foundation
Apache Software Foundation apache Linkis Spark Engineconn
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Sep 2024 07:45:00 +0000

Type Values Removed Values Added
Description In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue.
Title Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability
Weaknesses CWE-326
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2024-09-24T07:27:55.376Z

Updated: 2024-09-24T15:02:39.880Z

Reserved: 2024-07-04T10:29:50.346Z

Link: CVE-2024-39928

cve-icon Vulnrichment

Updated: 2024-09-24T15:02:39.880Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-25T01:15:40.693

Modified: 2024-09-26T13:32:02.803

Link: CVE-2024-39928

cve-icon Redhat

No data.