Loading HuntDB...

GHSA-3f3w-gmqf-4hj3

GitHub Security Advisory

Apache Linkis subject to Remote Code Execution via deserialization

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. This issue is patched in version 1.3.0, and users are recommended to upgrade.

Affected Packages

Maven org.apache.linkis:linkis
Affected versions: 0 (fixed in 1.3.0)

Related CVEs

Key Information

GHSA ID
GHSA-3f3w-gmqf-4hj3
Published
October 26, 2022 7:00 PM
Last Modified
October 31, 2022 3:53 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.apache.linkis:linkis
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 12, 2025 6:34 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.