Description
A vulnerability was found in DataLinkDC dinky up to 1.2.5. The impacted element is the function proxyUba of the file dinky-admin/src/main/java/org/dinky/controller/FlinkProxyController.java of the component Flink Proxy Controller. Performing a manipulation results in server-side request forgery. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
Timeline
| 2026-02-23: | Advisory disclosed |
| 2026-02-23: | VulDB entry created |
| 2026-02-23: | VulDB entry last update |
Credits
Ana10gy (VulDB User)
References
vuldb.com/?id.347410 (VDB-347410 | DataLinkDC dinky Flink Proxy Controller FlinkProxyController.java proxyUba server-side request forgery)
vuldb.com/?ctiid.347410 (VDB-347410 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.757587 (Submit #757587 | DataLinkDC dinky <=1.2.5 Server-Side Request Forgery)
github.com/AnalogyC0de/public_exp/issues/7
github.com/AnalogyC0de/public_exp/issues/7