In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected.
We recommend users to upgrade the version of Linkis to version 1.3.1.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T13:54:03.985Z
Reserved: 2022-11-03T08:45:25.305Z
Link: CVE-2022-44645

No data.

Status : Modified
Published: 2023-01-31T10:15:10.153
Modified: 2024-11-21T07:28:15.560
Link: CVE-2022-44645

No data.