Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.6.0.
When users change their password to a simple password (with any character or
symbol), attackers can easily guess the user's password and access the account.
Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 https://github.com/apache/inlong/pull/7805 to solve it.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/1fvloc3no1gbffzrcsx9ltsg08wr2d1w | Mailing List Vendor Advisory |
Configurations
History
31 May 2023, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:* | |
References | (MISC) https://lists.apache.org/thread/1fvloc3no1gbffzrcsx9ltsg08wr2d1w - Mailing List, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Apache
Apache inlong |
Information
Published : 2023-05-22 16:15
Updated : 2024-10-11 21:35
NVD link : CVE-2023-31098
Mitre link : CVE-2023-31098
CVE.ORG link : CVE-2023-31098
JSON object : View
Products Affected
apache
- inlong
CWE
CWE-521
Weak Password Requirements