Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7003 | In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.2.0 will be affected, We recommend users to update to 1.3.0. |
Github GHSA |
GHSA-3f3w-gmqf-4hj3 | Apache Linkis subject to Remote Code Execution via deserialization |
Solution
No solution given by the vendor.
Workaround
<= 1.2.0 users should upgrade to 1.3.0. Or upgrade the materials of JDBC EngineConn separately, you can refer to: https://github.com/apache/incubator-linkis/tree/master/linkis-engineconn-plugins/jdbc
Wed, 07 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-05-07T18:33:27.944Z
Reserved: 2022-09-05T00:00:00.000Z
Link: CVE-2022-39944
Updated: 2024-08-03T12:07:42.949Z
Status : Modified
Published: 2022-10-26T16:15:11.703
Modified: 2025-05-07T19:16:05.590
Link: CVE-2022-39944
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA