First published: Mon Apr 22 2024(Updated: )
Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.hugegraph:hugegraph-core | >=1.0.0<1.3.0 | 1.3.0 |
maven/org.apache.hugegraph:hugegraph-api | >=1.0.0<1.3.0 | 1.3.0 |
Apache HugeGraph | ||
Apache HugeGraph | >=1.0.0<1.3.0 | |
>=1.0.0<1.3.0 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27348 is classified as a critical vulnerability due to its potential to allow remote command execution.
To remediate CVE-2024-27348, upgrade Apache HugeGraph from any version prior to 1.3.0 to version 1.3.0 or later.
CVE-2024-27348 affects Apache HugeGraph versions from 1.0.0 up to, but not including, 1.3.0.
Yes, CVE-2024-27348 can lead to data compromise by allowing attackers to execute arbitrary code remotely.
Currently, the recommended approach is to upgrade to version 1.3.0 to mitigate the risk posed by CVE-2024-27348.