CVE-2023-49566 — Deserialization of Untrusted Data in Software Foundation Apache Linkis Datasource
Severity
8.8HIGHNVD
EPSS
0.5%
top 32.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 15
Description
In Apache Linkis <=1.5.0, due to the lack of effective filtering
of parameters, an attacker configuring malicious
db2
parameters in the DataSource Manager Module will result in jndi injection. Therefore, the parameters in the DB2 URL should be blacklisted.
This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out.
Versions of Apache Linkis
<=1.5.0
will be affected.
We recommend users upgrade the version of Linkis to version 1.6.0.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
3CVEList▶
Apache Linkis DataSource: JDBC Datasource Module with DB2 has JNDI Injection vulnerability↗2024-07-15
GHSA▶
Apache Linkis DataSource's JDBC Datasource Module with DB2 has JNDI Injection vulnerability↗2024-07-15
OSV▶
Apache Linkis DataSource's JDBC Datasource Module with DB2 has JNDI Injection vulnerability↗2024-07-15