|
Message-ID: <807216e0-677e-c550-8e53-3aa3a0a28b16@apache.org> Date: Fri, 02 Aug 2024 03:47:02 +0000 From: Heping Wang <peacewong@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-27181: Apache Linkis Basic management services: Privilege Escalation Attack vulnerability Severity: important Affected versions: - Apache Linkis Basic management services 1.3.2 before 1.6.0 Description: In Apache Linkis <= 1.5.0, Privilege Escalation in Basic management services where the attacking user is a trusted account allows access to Linkis's Token information. Users are advised to upgrade to version 1.6.0, which fixes this issue. Credit: superx (reporter) References: https://linkis.apache.org https://www.cve.org/CVERecord?id=CVE-2024-27181
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.