CVE-2022-44644

In Apache Linkis <=1.3.0 when used with the MySQL Connector/J in the data source module, an authenticated attacker could read arbitrary local files by connecting a rogue MySQL server, By adding allowLoadLocalInfile to true in the JDBC parameter. Therefore, the parameters in the JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected.  We recommend users upgrade the version of Linkis to version 1.3.1
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:28

Type Values Removed Values Added
References () https://lists.apache.org/thread/hwq9ytq6y1kdh9lz5znptkcrdll9x85h - Mailing List, Vendor Advisory () https://lists.apache.org/thread/hwq9ytq6y1kdh9lz5znptkcrdll9x85h - Mailing List, Vendor Advisory
Summary
  • (es) En Apache Linkis &lt;=1.3.0, cuando se usa con MySQL Connector/J en el módulo de fuente de datos, un atacante autenticado podría leer archivos locales arbitrarios conectando un servidor MySQL no autorizado, agregando enableLoadLocalInfile a verdadero en el parámetro JDBC. Por lo tanto, los parámetros en la URL de JDBC deben estar en la lista negra. Las versiones de Apache Linkis &lt;=1.3.0 se verán afectadas. Recomendamos a los usuarios actualizar la versión de Linkis a la versión 1.3.1

15 Mar 2023, 09:15

Type Values Removed Values Added
Summary In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, an authenticated attacker could read arbitrary local file by connecting a rogue mysql server, By adding allowLoadLocalInfile to true in the jdbc parameter. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3 In Apache Linkis <=1.3.0 when used with the MySQL Connector/J in the data source module, an authenticated attacker could read arbitrary local files by connecting a rogue MySQL server, By adding allowLoadLocalInfile to true in the JDBC parameter. Therefore, the parameters in the JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.1

14 Mar 2023, 18:31

Type Values Removed Values Added
CWE CWE-200 CWE-20
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References (MISC) https://lists.apache.org/thread/hwq9ytq6y1kdh9lz5znptkcrdll9x85h - (MISC) https://lists.apache.org/thread/hwq9ytq6y1kdh9lz5znptkcrdll9x85h - Mailing List, Vendor Advisory
CPE cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*

31 Jan 2023, 13:49

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-31 10:15

Updated : 2025-03-27 15:15


NVD link : CVE-2022-44644

Mitre link : CVE-2022-44644

CVE.ORG link : CVE-2022-44644


JSON object : View

Products Affected

apache

  • linkis
CWE
CWE-20

Improper Input Validation