Apache Linkis JDBC EngineConn has deserialization vulnerability
Critical severity
GitHub Reviewed
Published
Apr 10, 2023
to the GitHub Advisory Database
•
Updated Feb 13, 2025
Package
Affected versions
< 1.3.2
Patched versions
1.3.2
Description
Published by the National Vulnerability Database
Apr 10, 2023
Published to the GitHub Advisory Database
Apr 10, 2023
Reviewed
Apr 10, 2023
Last updated
Feb 13, 2025
In Apache Linkis <=1.3.1, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in JDBC EngineConn Module will trigger a deserialization vulnerability and eventually lead to remote code execution. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. Users should upgrade their version of Linkis to version 1.3.2.
References