We recommend users to upgrade the version of Linkis to version 1.3.1.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0482 | In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1. |
Github GHSA |
GHSA-h6w8-52mq-4qxc | Apache Linkis contains Deserialization of Untrusted Data |
Thu, 27 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T14:35:59.646Z
Reserved: 2022-11-03T08:45:25.305Z
Link: CVE-2022-44645
Updated: 2024-08-03T13:54:03.985Z
Status : Modified
Published: 2023-01-31T10:15:10.153
Modified: 2025-03-27T15:15:38.180
Link: CVE-2022-44645
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA