Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability
High severity
GitHub Reviewed
Published
Sep 25, 2024
to the GitHub Advisory Database
•
Updated Sep 25, 2024
Package
Affected versions
< 1.6.0
Patched versions
1.6.0
Description
Published by the National Vulnerability Database
Sep 25, 2024
Published to the GitHub Advisory Database
Sep 25, 2024
Reviewed
Sep 25, 2024
Last updated
Sep 25, 2024
In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils.
Users are recommended to upgrade to version 1.6.0, which fixes this issue.
References