In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected.
We recommend users to upgrade the version of Linkis to version 1.3.1.
We recommend users to upgrade the version of Linkis to version 1.3.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0482 | In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1. |
Github GHSA |
GHSA-h6w8-52mq-4qxc | Apache Linkis contains Deserialization of Untrusted Data |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T14:35:59.646Z
Reserved: 2022-11-03T08:45:25.305Z
Link: CVE-2022-44645
Updated: 2024-08-03T13:54:03.985Z
Status : Modified
Published: 2023-01-31T10:15:10.153
Modified: 2025-03-27T15:15:38.180
Link: CVE-2022-44645
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA