Apache Linkis JDBC EngineConn has deserialization vulnerability
Critical severity
GitHub Reviewed
Published
Apr 10, 2023
to the GitHub Advisory Database
•
Updated Apr 14, 2023
Package
Affected versions
< 1.3.2
Patched versions
1.3.2
Description
Published by the National Vulnerability Database
Apr 10, 2023
Published to the GitHub Advisory Database
Apr 10, 2023
Reviewed
Apr 10, 2023
Last updated
Apr 14, 2023
In Apache Linkis <=1.3.1, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in JDBC EngineConn Module will trigger a deserialization vulnerability and eventually lead to remote code execution. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. Users should upgrade their version of Linkis to version 1.3.2.
References