CVE-2024-27181

In Apache Linkis <= 1.5.0, Privilege Escalation in Basic management services where the attacking user is a trusted account allows access to Linkis's Token information. Users are advised to upgrade to version 1.6.0, which fixes this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*

History

03 Jun 2025, 21:22

Type Values Removed Values Added
References () https://lists.apache.org/thread/hosd73l7hxb3rpt5rb0yg0ld11zph4c6 - () https://lists.apache.org/thread/hosd73l7hxb3rpt5rb0yg0ld11zph4c6 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/08/02/3 - () http://www.openwall.com/lists/oss-security/2024/08/02/3 - Mailing List
First Time Apache
Apache linkis
CPE cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*

21 Nov 2024, 09:04

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/08/02/3 -

02 Aug 2024, 14:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

02 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En Apache Linkis &lt;= 1.5.0, la escalada de privilegios en los servicios de administración básicos donde el usuario atacante es una cuenta de confianza permite el acceso a la información del token de Linkis. Se recomienda a los usuarios actualizar a la versión 1.6.0, que soluciona este problema.

02 Aug 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-02 10:15

Updated : 2025-06-03 21:22


NVD link : CVE-2024-27181

Mitre link : CVE-2024-27181

CVE.ORG link : CVE-2024-27181


JSON object : View

Products Affected

apache

  • linkis
CWE
CWE-269

Improper Privilege Management