Lucene search

K
githubGitHub Advisory DatabaseGHSA-H6W8-52MQ-4QXC
HistoryJan 31, 2023 - 12:30 p.m.

Apache Linkis contains Deserialization of Untrusted Data

2023-01-3112:30:24
CWE-502
GitHub Advisory Database
github.com
7
apache linkis
mysql connector/j
deserialization
remote code execution
vulnerability
version 1.3.0
upgrade
security issue

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

65.9%

In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1.

Affected configurations

Vulners
Node
org.apache.linkislinkisRange<1.3.1
VendorProductVersionCPE
org.apache.linkislinkis*cpe:2.3:a:org.apache.linkis:linkis:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

65.9%

Related for GHSA-H6W8-52MQ-4QXC