-
Notifications
You must be signed in to change notification settings - Fork 358
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
c493dc9
commit 2f9b91d
Showing
3 changed files
with
139 additions
and
46 deletions.
There are no files selected for viewing
65 changes: 65 additions & 0 deletions
65
advisories/github-reviewed/2025/01/GHSA-8cvq-3jjp-ph9p/GHSA-8cvq-3jjp-ph9p.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-8cvq-3jjp-ph9p", | ||
"modified": "2025-01-14T20:07:31Z", | ||
"published": "2025-01-14T18:31:59Z", | ||
"aliases": [ | ||
"CVE-2024-45627" | ||
], | ||
"summary": "Apache Linkis Metadata Query Service JDBC: JDBC Datasource Module with Mysql has file read vulnerability", | ||
"details": "# Affected versions:\n\n- Apache Linkis Metadata Query Service JDBC 1.5.0 before 1.7.0\n\n# Description:\n\nIn Apache Linkis <1.7.0, due to the lack of effective filtering of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will allow the attacker to read arbitrary files from the Linkis server. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis < 1.6.0 will be affected.\n\nWe recommend users upgrade the version of Linkis to version 1.7.0.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"package": { | ||
"ecosystem": "Maven", | ||
"name": "org.apache.linkis:linkis-metadata-query-service-jdbc" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "ECOSYSTEM", | ||
"events": [ | ||
{ | ||
"introduced": "1.5.0" | ||
}, | ||
{ | ||
"fixed": "1.7.0" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45627" | ||
}, | ||
{ | ||
"type": "PACKAGE", | ||
"url": "https://github.com/apache/linkis" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://lists.apache.org/thread/0zzx8lldwoqgzq98mg61hojgpvn76xsh" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "http://www.openwall.com/lists/oss-security/2025/01/14/1" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-552" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": true, | ||
"github_reviewed_at": "2025-01-14T20:07:31Z", | ||
"nvd_published_at": "2025-01-14T17:15:17Z" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
40 changes: 0 additions & 40 deletions
40
advisories/unreviewed/2025/01/GHSA-8cvq-3jjp-ph9p/GHSA-8cvq-3jjp-ph9p.json
This file was deleted.
Oops, something went wrong.