Lucene search

K
cveApacheCVE-2023-49566
HistoryJul 15, 2024 - 8:15 a.m.

CVE-2023-49566

2024-07-1508:15:02
CWE-502
apache
web.nvd.nist.gov
30
apache linkis
jndi injection
datasource manager module
db2 url
cve-2023-49566

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

39.9%

In Apache Linkis <=1.5.0, due to the lack of effective filtering
of parameters, an attacker configuring malicious

db2

parameters in the DataSource Manager Module will resultΒ in jndi injection. Therefore, the parameters in the DB2 URL should be blacklisted.

This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out.

Versions of Apache Linkis

<=1.5.0

will be affected.
We recommend users upgrade the version of Linkis to version 1.6.0.

Affected configurations

Nvd
Vulners
Node
apachelinkisRange1.4.0–1.6.0
VendorProductVersionCPE
apachelinkis*cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "collectionURL": "https://repo.maven.apache.org/maven2",
    "defaultStatus": "unaffected",
    "packageName": "org.apache.linkis:linkis-metadata-query-service-jdbc",
    "product": "Apache Linkis DataSource",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "1.6.0",
        "status": "affected",
        "version": "*",
        "versionType": "maven"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

39.9%