CVE-2024-45627 – Apache Linkis Arbitrary File Read Vulnerability

The following table lists the changes that have been made to the
CVE-2024-45627 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jan. 14, 2025

    Action Type Old Value New Value
    Added Description In Apache Linkis <1.7.0, due to the lack of effective filtering
    of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will

    allow the attacker to read arbitrary files from the Linkis server. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis < 1.7.0 will be affected.
    We recommend users upgrade the version of Linkis to version 1.7.0.

    Added CWE CWE-552
    Added Reference https://lists.apache.org/thread/0zzx8lldwoqgzq98mg61hojgpvn76xsh
  • CVE Modified
    by af854a3a-2127-422b-91ae-364da2661108

    Jan. 14, 2025

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2025/01/14/1
Share the Post:

Related Posts