The following table lists the changes that have been made to the
CVE-2024-45627 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jan. 14, 2025
Action Type Old Value New Value Added Description In Apache Linkis <1.7.0, due to the lack of effective filtering
of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module willallow the attacker to read arbitrary files from the Linkis server. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis < 1.7.0 will be affected.
We recommend users upgrade the version of Linkis to version 1.7.0.Added CWE CWE-552 Added Reference https://lists.apache.org/thread/0zzx8lldwoqgzq98mg61hojgpvn76xsh -
CVE Modified
by af854a3a-2127-422b-91ae-364da2661108Jan. 14, 2025
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2025/01/14/1