CVE-2023-29216
CVSS V2 None
CVSS V3 None
Description
In Apache Linkis <=1.3.1, because the parameters are not
effectively filtered, the attacker uses the MySQL data source and malicious parameters to
configure a new data source to trigger a deserialization vulnerability, eventually leading to
remote code execution.
Versions of Apache Linkis <= 1.3.0 will be affected.
We recommend users upgrade the version of Linkis to version 1.3.2.
Overview
- CVE ID
- CVE-2023-29216
- Assigner
- security@apache.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-10T08:15:07
- Last Modified Date
- 2023-04-13T18:16:11
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:* | 1 | OR | 1.3.1 |
References
Reference URL | Reference Tags |
---|---|
http://www.openwall.com/lists/oss-security/2023/04/10/5 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l | Mailing List Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-29216 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29216 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:25:16 | Added to TrackCVE | |||
2023-04-17 04:25:19 | Weakness Enumeration | new |