In Apache Linkis <=1.3.1, because the parameters are not effectively filtered, the attacker can use the MySQL data source and malicious parameters to configure a new data source to trigger a deserialization vulnerability, eventually leading to remote code execution. Users should upgrade their version of Linkis to version 1.3.2.
{
"severity": "CRITICAL",
"nvd_published_at": "2023-04-10T08:15:00Z",
"github_reviewed_at": "2023-04-10T16:58:23Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-502"
]
}