You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@linkis.apache.org by Heping Wang <pe...@apache.org> on 2023/04/10 06:15:02 UTC

CVE-2023-29216: Apache Linkis DatasourceManager module has a deserialization command execution

Severity: important

Description:

In Apache Linkis <=1.3.1, because the parameters are not
effectively filtered, the attacker uses the MySQL data source and malicious parameters to
configure a new data source to trigger a deserialization vulnerability, eventually leading to
remote code execution.
 Versions of Apache Linkis <= 1.3.0 will be affected.
We recommend users upgrade the version of Linkis to version 1.3.2.

Credit:

sw0rd1ight (reporter)

References:

https://linkis.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-29216


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@linkis.apache.org
For additional commands, e-mail: dev-help@linkis.apache.org