In Apache Linkis <=1.3.1, because... CVE-2023-29216

- AV AC AU C I A
发布: 2023-04-10
修订: 2023-04-13

In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker uses the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users upgrade the version of Linkis to version 1.3.2.

0%
暂无可用Exp或PoC
当前有1条受影响产品信息