In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.2.0 will be affected, We recommend users to update to 1.3.0.
History

Wed, 07 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2022-10-26T00:00:00.000Z

Updated: 2025-05-07T18:33:27.944Z

Reserved: 2022-09-05T00:00:00.000Z

Link: CVE-2022-39944

cve-icon Vulnrichment

Updated: 2024-08-03T12:07:42.949Z

cve-icon NVD

Status : Modified

Published: 2022-10-26T16:15:11.703

Modified: 2025-05-07T19:16:05.590

Link: CVE-2022-39944

cve-icon Redhat

No data.