Severity: important Description:
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1. Credit: Tian Xin WU (Bearcat) , Vulnerability Researcher at Numen Cyber Labs, Singapore. (reporter) Department of Cyber Security Research (Jumbo, Unc1e) (remediation developer) s3gundo of Hundsun Tech (remediation developer) References: https://linkis.incubator.apache.org https://www.cve.org/CVERecord?id=CVE-2022-44645 --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@linkis.apache.org For additional commands, e-mail: dev-h...@linkis.apache.org