CVE-2024-39928

CWE-3264 documents4 sources
Severity
7.5HIGH
EPSS
0.2%
top 63.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 25

Description

In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

🔴Vulnerability Details

3
OSV
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability2024-09-25
GHSA
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability2024-09-25
CVEList
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability2024-09-24
CVE-2024-39928 (HIGH CVSS 7.5) | In Apache Linkis <= 1.5.0 | cvebase.io