In Apache Linkis <=1.3.1, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in JDBC EengineConn Module will trigger a deserialization vulnerability and eventually lead to remote code execution. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/04/10/4 Mailing List Third Party Advisory
https://lists.apache.org/thread/o682wz1ggq491ybvjwokxvcdtnzo76ls Mailing List Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: apache

Published: 2023-04-10T07:35:23.690Z

Updated: 2023-04-10T07:35:23.690Z

Reserved: 2023-04-03T14:49:09.555Z


Link: CVE-2023-29215

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-04-10T08:15:07.237

Modified: 2023-04-13T18:16:08.277


Link: CVE-2023-29215

JSON object: View

cve-icon Redhat Information

No data.

CWE