In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils.
Users are recommended to upgrade to version 1.6.0, which fixes this issue.
GSA_kwCzR0hTQS02Z2NoLTYzd3AtNHY1Zs4AA_wz
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability
| Affected Packages | Affected Versions | Fixed Versions | |
|---|---|---|---|
| maven:org.apache.linkis:linkis-engineplugin-spark | < 1.6.0 | 1.6.0 | |
Affected Version RangesAll affected versions1.0.3, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.5.0 All unaffected versions1.6.0, 1.7.0, 1.8.0 |
|||