CVE-2024-27181

8.8 HIGH

📋 TL;DR

Apache Linkis versions up to 1.5.0 contain a privilege escalation vulnerability where trusted accounts can access token information they shouldn't have permission to view. This allows attackers with trusted account access to potentially compromise authentication tokens and escalate privileges. Organizations running Apache Linkis 1.5.0 or earlier are affected.

💻 Affected Systems

Products:
  • Apache Linkis
Versions: <= 1.5.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have trusted account access to the Linkis system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with trusted account access can steal authentication tokens, gain administrative privileges, compromise the entire Linkis deployment, and potentially access connected data systems.

🟠

Likely Case

Trusted users abuse their access to steal tokens, impersonate other users, and gain unauthorized access to sensitive data and system functions.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to token exposure requiring token rotation and user account review.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access as a trusted user, making it accessible to insiders or compromised accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.0

Vendor Advisory: https://lists.apache.org/thread/hosd73l7hxb3rpt5rb0yg0ld11zph4c6

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Apache Linkis 1.6.0 from official sources. 3. Stop Linkis services. 4. Deploy version 1.6.0 following upgrade documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Restrict Trusted Account Access

all

Limit the number of trusted accounts and implement strict access controls for basic management services.

Implement Token Monitoring

all

Monitor token usage and implement alerts for unusual token access patterns.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access basic management services.
  • Monitor and audit all token-related activities and implement automated token rotation policies.

🔍 How to Verify

Check if Vulnerable:

Check Linkis version via web interface or configuration files. If version is 1.5.0 or earlier, system is vulnerable.

Check Version:

Check linkis.properties or web interface for version information.

Verify Fix Applied:

Verify Linkis version is 1.6.0 or later and test that trusted accounts cannot access unauthorized token information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual token access patterns
  • Multiple token requests from single user
  • Access to token endpoints by non-admin users

Network Indicators:

  • Unusual API calls to token management endpoints
  • Increased traffic to basic management services

SIEM Query:

source="linkis" AND (uri="/api/token*" OR uri="/api/basic*" OR message="token access")

🔗 References

📤 Share & Export