Description
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J in the data source module, an authenticated attacker could read arbitrary local files by connecting a rogue MySQL server, By adding allowLoadLocalInfile to true in the JDBC parameter. Therefore, the parameters in the JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected.
We recommend users upgrade the version of Linkis to version 1.3.1
We recommend users upgrade the version of Linkis to version 1.3.1
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0550 | In Apache Linkis <=1.3.0 when used with the MySQL Connector/J in the data source module, an authenticated attacker could read arbitrary local files by connecting a rogue MySQL server, By adding allowLoadLocalInfile to true in the JDBC parameter. Therefore, the parameters in the JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.1 |
Github GHSA |
GHSA-rx76-xw35-6rh8 | Apache Linkis vulnerable to Exposure of Sensitive Information |
References
History
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T14:34:42.612Z
Reserved: 2022-11-03T08:44:03.767Z
Link: CVE-2022-44644
Updated: 2024-08-03T13:54:03.937Z
Status : Modified
Published: 2023-01-31T10:15:09.233
Modified: 2025-03-27T15:15:37.987
Link: CVE-2022-44644
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA