Lucene search

K
vulnrichmentApacheVULNRICHMENT:CVE-2023-49566
HistoryJul 15, 2024 - 7:56 a.m.

CVE-2023-49566 Apache Linkis DataSource: JDBC Datasource Module with DB2 has JNDI Injection vulnerability

2024-07-1507:56:51
CWE-502
apache
github.com
4
apache linkis
jdbc
db2
jndi injection
datasource
version 1.5.0
version 1.6.0
security vulnerability

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

39.9%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In Apache Linkis <=1.5.0, due to the lack of effective filtering
of parameters, an attacker configuring malicious

db2

parameters in the DataSource Manager Module will resultΒ in jndi injection. Therefore, the parameters in the DB2 URL should be blacklisted.

This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out.

Versions of Apache Linkis

<=1.5.0

will be affected.
We recommend users upgrade the version of Linkis to version 1.6.0.

CNA Affected

[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Linkis DataSource",
    "versions": [
      {
        "status": "affected",
        "version": "*",
        "lessThan": "1.6.0",
        "versionType": "maven"
      }
    ],
    "packageName": "org.apache.linkis:linkis-metadata-query-service-jdbc",
    "collectionURL": "https://repo.maven.apache.org/maven2",
    "defaultStatus": "unaffected"
  }
]

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

39.9%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-49566