Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-jjvc-v8gw-5255: Apache Linkis DataSource remote code execution vulnerability

In Apache Linkis <= 1.5.0, data source management module, when adding Mysql data source, exists remote code execution vulnerability for java version < 1.8.0_241. The deserialization vulnerability exploited through jrmp can inject malicious files into the server and execute them.

This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. We recommend that users upgrade the java version to >= 1.8.0_241. Or users upgrade Linkis to version 1.6.0.

ghsa
#sql#vulnerability#apache#git#java#rce#auth#maven

Package

maven org.apache.linkis:linkis-datasource (Maven)

Affected versions

>= 1.4.0, < 1.6.0

Patched versions

1.6.0

Description

In Apache Linkis <= 1.5.0, data source management module, when adding Mysql data source, exists remote code execution vulnerability for java version < 1.8.0_241. The deserialization vulnerability exploited through jrmp can inject malicious files into the server and execute them.

This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. We recommend that users upgrade the java version to >= 1.8.0_241. Or users upgrade Linkis to version 1.6.0.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2023-46801
  • https://lists.apache.org/thread/0dnzh64xy1n7qo3rgo2loz9zn7m9xgdx
  • https://linkis.apache.org/download/release-notes-1.6.0

Published by the National Vulnerability Database

Jul 15, 2024

Published to the GitHub Advisory Database

Jul 15, 2024

Reviewed

Jul 15, 2024

Last updated

Jul 15, 2024

ghsa: Latest News

GHSA-pj33-75x5-32j4: RabbitMQ HTTP API's queue deletion endpoint does not verify that the user has a required permission