Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ycmhmLTMycnEtZjI4aM4AAyo_
Apache Linkis DatasourceManager module has deserialization vulnerability
In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker can use the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Users should upgrade their version of Linkis to version 1.3.2.
Permalink: https://github.com/advisories/GHSA-rrhf-32rq-f28hJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ycmhmLTMycnEtZjI4aM4AAyo_
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-rrhf-32rq-f28h, CVE-2023-29216
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-29216
- https://lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l
- https://linkis.apache.org/download/release-notes-1.3.2/
- http://www.openwall.com/lists/oss-security/2023/04/10/5
- https://github.com/advisories/GHSA-rrhf-32rq-f28h
Affected Packages
maven:org.apache.linkis:linkis-datasource
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: < 1.3.2
Fixed in: 1.3.2
All affected versions: 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.3.0, 1.3.1
All unaffected versions: 1.3.2, 1.4.0, 1.5.0