In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.2.0 will be affected, We recommend users to update to 1.3.0.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T12:07:42.949Z
Reserved: 2022-09-05T00:00:00
Link: CVE-2022-39944

No data.

Status : Modified
Published: 2022-10-26T16:15:11.703
Modified: 2024-11-21T07:18:31.890
Link: CVE-2022-39944

No data.