Apache Linkis vulnerable to Exposure of Sensitive Information
Moderate severity
GitHub Reviewed
Published
Jan 31, 2023
to the GitHub Advisory Database
•
Updated Mar 14, 2023
Description
Published by the National Vulnerability Database
Jan 31, 2023
Published to the GitHub Advisory Database
Jan 31, 2023
Reviewed
Feb 2, 2023
Last updated
Mar 14, 2023
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, an authenticated attacker could read arbitrary local file by connecting a rogue mysql server, By adding allowLoadLocalInfile to true in the jdbc parameter. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.1
References