Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2aff3b25-81e9-1bbd-6338-cea12a825809@apache.org>
Date: Tue, 31 Jan 2023 07:31:04 +0000
From: Heping Wang <peacewong@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-44644: Apache Linkis (incubating): The DatasourceManager
 module has a Local File Read Vulnerability 

Severity: important

Description:

In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, an authenticated attacker could read arbitrary local file by connecting a rogue mysql server, By adding allowLoadLocalInfile to true in the jdbc parameter. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. 

We recommend users upgrade the version of Linkis to version 1.3

Credit:

Department of Cyber Security Research (Jumbo, Unc1e), Beijing Zhiqian Technology Co., LTD (reporter)
s3gundo of Hundsun Tech  (reporter)

References:

https://linkis.incubator.apache.org
https://www.cve.org/CVERecord?id=CVE-2022-44644

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.