Apache Linkis subject to Remote Code Execution via deserialization
High severity
GitHub Reviewed
Published
Oct 26, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Description
Published by the National Vulnerability Database
Oct 26, 2022
Published to the GitHub Advisory Database
Oct 26, 2022
Reviewed
Oct 27, 2022
Last updated
Jan 30, 2023
In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. This issue is patched in version 1.3.0, and users are recommended to upgrade.
References