CVE-2024-27181

In Apache Linkis <= 1.5.0, Privilege Escalation in Basic management services where the attacking user is a trusted account allows access to Linkis's Token information. Users are advised to upgrade to version 1.6.0, which fixes this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*

History

03 Jun 2025, 21:22

Type Values Removed Values Added
CPE cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*
First Time Apache linkis
Apache
References () https://lists.apache.org/thread/hosd73l7hxb3rpt5rb0yg0ld11zph4c6 - () https://lists.apache.org/thread/hosd73l7hxb3rpt5rb0yg0ld11zph4c6 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/08/02/3 - () http://www.openwall.com/lists/oss-security/2024/08/02/3 - Mailing List

Information

Published : 2024-08-02 10:15

Updated : 2025-06-03 21:22


NVD link : CVE-2024-27181

Mitre link : CVE-2024-27181

CVE.ORG link : CVE-2024-27181


JSON object : View

Products Affected

apache

  • linkis
CWE
CWE-269

Improper Privilege Management