Lucene search

K
githubGitHub Advisory DatabaseGHSA-F22J-9J59-33J4
HistoryJul 15, 2024 - 9:36 a.m.

Apache Linkis DataSource allows arbitrary file reading

2024-07-1509:36:22
CWE-552
GitHub Advisory Database
github.com
6
apache linkis
datasource
file reading
vulnerability
mysql jdbc
blacklisting
version 1.4.0
version 1.6.0

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

29.1%

In Apache Linkis = 1.4.0, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will triggerΒ arbitrary file reading. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out.

Versions of Apache Linkis = 1.4.0 will be affected.

We recommend users upgrade the version of Linkis to version 1.6.0.

Affected configurations

Vulners
Node
org.apache.linkis\linkisMatchdatasource
VendorProductVersionCPE
org.apache.linkis\linkisdatasourcecpe:2.3:a:org.apache.linkis\:linkis:datasource:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

29.1%

Related for GHSA-F22J-9J59-33J4