GHSA-3f3w-gmqf-4hj3
GitHub Security Advisory
Apache Linkis subject to Remote Code Execution via deserialization
✓ GitHub Reviewed
HIGH
Has CVE
Advisory Details
In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. This issue is patched in version 1.3.0, and users are recommended to upgrade.
Affected Packages
Maven
org.apache.linkis:linkis
Affected versions:
0
(fixed in 1.3.0)
Related CVEs
Key Information
7.5
/10
Dataset
Last updated: September 12, 2025 6:34 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.