CVE-2024-27182

Source
https://cve.org/CVERecord?id=CVE-2024-27182
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27182.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27182
Aliases
Published
2024-08-02T10:16:00.250Z
Modified
2026-03-12T02:31:03.837236Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

In Apache Linkis <= 1.5.0,

Arbitrary file deletion in Basic management services on

A user with an administrator account could delete any file accessible by the Linkis system user

. Users are recommended to upgrade to version 1.6.0, which fixes this issue.

References

Affected packages

Git / github.com/apache/incubator-linkis

Affected ranges

Type
GIT
Repo
https://github.com/apache/incubator-linkis
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.3.2"
        },
        {
            "fixed": "1.6.0"
        }
    ]
}

Affected versions

1.*
1.3.2
1.5.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27182.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "target": {
            "file": "linkis-computation-governance/linkis-entrance/src/main/java/org/apache/linkis/entrance/restful/EntranceRestfulApi.java"
        },
        "source": "https://github.com/apache/incubator-linkis/commit/9be69de555a4539c73b56dd44c798026596f0f54",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "225731198629722605236678847431119311777",
                "206877223739141534512710189071403489297",
                "265000549159365350083479690704441430136",
                "334199407620554550494929358819571833638",
                "225731198629722605236678847431119311777",
                "206877223739141534512710189071403489297",
                "184922721631577521172341610262425618245",
                "107429859391792390745803307503868481895"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2024-27182-1761b71c",
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "linkis-computation-governance/linkis-entrance/src/main/java/org/apache/linkis/entrance/restful/EntranceRestfulApi.java",
            "function": "submit"
        },
        "source": "https://github.com/apache/incubator-linkis/commit/9be69de555a4539c73b56dd44c798026596f0f54",
        "deprecated": false,
        "digest": {
            "function_hash": "60828749064976347165812819771182215424",
            "length": 1879.0
        },
        "id": "CVE-2024-27182-266f1a2e",
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "linkis-computation-governance/linkis-entrance/src/main/java/org/apache/linkis/entrance/restful/EntranceRestfulApi.java",
            "function": "execute"
        },
        "source": "https://github.com/apache/incubator-linkis/commit/9be69de555a4539c73b56dd44c798026596f0f54",
        "deprecated": false,
        "digest": {
            "function_hash": "192796447668438242518408730468241430717",
            "length": 1548.0
        },
        "id": "CVE-2024-27182-83a9e203",
        "signature_type": "Function"
    }
]