Severity: important

Description:

In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a 
deserialization vulnerability with possible remote code execution impact exists 
when an attacker has write access to a database and configures new datasource 
with a MySQL data source and malicious parameters. Therefore, the parameters in 
the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be 
affected.

We recommend users to upgrade the version of Linkis to version 1.3.1.

Credit:

Tian Xin WU (Bearcat) , Vulnerability Researcher at Numen Cyber ​​​​Labs, 
Singapore. (reporter)
Department of Cyber Security Research (Jumbo, Unc1e) (remediation developer)
s3gundo of Hundsun Tech  (remediation developer)

References:

https://linkis.incubator.apache.org
https://www.cve.org/CVERecord?id=CVE-2022-44645


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@linkis.apache.org
For additional commands, e-mail: dev-h...@linkis.apache.org

Reply via email to