We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker uses the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.
Reserved 2023-04-03 | Published 2023-04-10 | Updated 2025-02-13 | Assigner apacheCWE-502 Deserialization of Untrusted Data
sw0rd1ight
lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l
www.openwall.com/lists/oss-security/2023/04/10/5
Support options