Multiple vulnerabilities in Apache Linkis



Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2023-29215
CVE-2023-27987
CVE-2023-27603
CVE-2023-29216
CVE-2023-27602
CWE-ID CWE-502
CWE-285
CWE-434
Exploitation vector Network
Public exploit N/A
Vulnerable software
Linkis
Server applications / Application servers

Vendor Apache Foundation

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Deserialization of Untrusted Data

EUVDB-ID: #VU74623

Risk: Low

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-29215

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data within the JDBC EengineConn module. A remote user can pass specially crafted Mysql JDBC parameters to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linkis: 0.5.0 - 1.3.1

CPE2.3 External links

https://lists.apache.org/thread/o682wz1ggq491ybvjwokxvcdtnzo76ls


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Authorization

EUVDB-ID: #VU74622

Risk: High

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2023-27987

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to the application.

The vulnerability exists due to usage of a weak default access token. A remote attacker can brute-force the authorization token and gain unauthorized access to the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linkis: 0.5.0 - 1.3.1

CPE2.3 External links

https://lists.apache.org/thread/3cr1cz3210wzwngldwrqzm43vwhghp0p


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Arbitrary file upload

EUVDB-ID: #VU74621

Risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2023-27603

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload when handling .zip archives within the Manager module engineConn. A remote attacker can upload a malicious archive and execute arbitrary files on the server once the archive is unpacked.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linkis: 0.5.0 - 1.3.1

CPE2.3 External links

https://lists.apache.org/thread/6n1vlvnyn441rm02zdqc0wnpckj8ltn8


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Deserialization of Untrusted Data

EUVDB-ID: #VU74620

Risk: Low

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-29216

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data. A remote user can leverage the MySQL data source and malicious parameters to configure a new data source and execute arbitrary code on the system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linkis: 0.5.0 - 1.3.1

CPE2.3 External links

https://lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Arbitrary file upload

EUVDB-ID: #VU74619

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2023-27602

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload. A remote attacker can upload a malicious file and execute it on the server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Linkis: 0.5.0 - 1.3.1

CPE2.3 External links

https://lists.apache.org/thread/wt70jfc0yfs6s5g0wg5dr5klnc48nsp1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###