First published: Mon May 22 2023(Updated: )
Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.6.0. When users change their password to a simple password (with any character or symbol), attackers can easily guess the user's password and access the account. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 https://github.com/apache/inlong/pull/7805 to solve it.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache InLong | >=1.1.0<=1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-31098.
The title of the vulnerability is Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.
The affected software is Apache InLong version 1.1.0 through 1.6.0.
The severity of the vulnerability is critical with a CVSS score of 9.8.
An attacker can easily guess a user's password when they change it to a simple password with any character or symbol, allowing them to access the account.
Yes, it is recommended to upgrade Apache InLong to a version beyond 1.6.0 to fix this vulnerability.