Lucene search

K
cveApacheCVE-2023-41916
HistoryJul 15, 2024 - 8:15 a.m.

CVE-2023-41916

2024-07-1508:15:02
CWE-552
apache
web.nvd.nist.gov
32
apache linkis
mysql jdbc parameters
arbitrary file reading
datasource manager module
blacklisting
authorized account
version 1.4.0
version 1.5.0

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

29.1%

In Apache Linkis =1.4.0, due to the lack of effective filtering
of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will triggerΒ arbitrary file reading. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis = 1.4.0 will be affected.Β 
We recommend users upgrade the version of Linkis to version 1.5.0.

Affected configurations

Nvd
Vulners
Node
apachelinkisRange1.4.0–1.6.0
VendorProductVersionCPE
apachelinkis*cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "collectionURL": "https://repo.maven.apache.org/maven2",
    "defaultStatus": "unaffected",
    "packageName": "org.apache.linkis:linkis-metadata-query-service-jdbc",
    "product": "Apache Linkis DataSource",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "1.5.0",
        "status": "affected",
        "version": "1.4.0",
        "versionType": "maven"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

29.1%