In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. This issue is patched in version 1.3.0, and users are recommended to upgrade.
{ "nvd_published_at": "2022-10-26T16:15:00Z", "github_reviewed_at": "2022-10-27T18:40:10Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-502" ] }