In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker uses the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/04/10/5 Mailing List Third Party Advisory
https://lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l Mailing List Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: apache

Published: 2023-04-10T07:37:29.383Z

Updated: 2023-04-10T07:37:29.383Z

Reserved: 2023-04-03T15:04:14.339Z


Link: CVE-2023-29216

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-04-10T08:15:07.290

Modified: 2023-04-13T18:16:11.797


Link: CVE-2023-29216

JSON object: View

cve-icon Redhat Information

No data.

CWE