In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.2.0 will be affected, We recommend users to update to 1.3.0.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/rxytj48q17304snonjtyt5lnlw64gccc | Issue Tracking Third Party Advisory |
Configurations
History
28 Oct 2022, 17:40
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://lists.apache.org/thread/rxytj48q17304snonjtyt5lnlw64gccc - Issue Tracking, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:* | |
CWE | CWE-502 |
26 Oct 2022, 17:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-26 16:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-39944
Mitre link : CVE-2022-39944
CVE.ORG link : CVE-2022-39944
JSON object : View
Products Affected
apache
- linkis
CWE
CWE-502
Deserialization of Untrusted Data