We recommend users upgrade the version of Linkis to version 1.3.1
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0550 | In Apache Linkis <=1.3.0 when used with the MySQL Connector/J in the data source module, an authenticated attacker could read arbitrary local files by connecting a rogue MySQL server, By adding allowLoadLocalInfile to true in the JDBC parameter. Therefore, the parameters in the JDBC URL should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.1 |
Github GHSA |
GHSA-rx76-xw35-6rh8 | Apache Linkis vulnerable to Exposure of Sensitive Information |
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T14:34:42.612Z
Reserved: 2022-11-03T08:44:03.767Z
Link: CVE-2022-44644
Updated: 2024-08-03T13:54:03.937Z
Status : Modified
Published: 2023-01-31T10:15:09.233
Modified: 2025-03-27T15:15:37.987
Link: CVE-2022-44644
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA