We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-29216

Apache Linkis DatasourceManager module has a deserialization command execution



Description

In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker uses the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.

Reserved 2023-04-03 | Published 2023-04-10 | Updated 2025-02-13 | Assigner apache

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

Any version
affected

Credits

sw0rd1ight reporter

References

lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l vendor-advisory mailing-list

www.openwall.com/lists/oss-security/2023/04/10/5

cve.org (CVE-2023-29216)

nvd.nist.gov (CVE-2023-29216)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-29216

Support options

Helpdesk Chat, Email, Knowledgebase