SB2023041025 - Multiple vulnerabilities in Apache Linkis
Published: April 10, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Deserialization of Untrusted Data (CVE-ID: CVE-2023-29215)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data within the JDBC EengineConn module. A remote user can pass specially crafted Mysql JDBC parameters to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Improper Authorization (CVE-ID: CVE-2023-27987)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to usage of a weak default access token. A remote attacker can brute-force the authorization token and gain unauthorized access to the application.
3) Arbitrary file upload (CVE-ID: CVE-2023-27603)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload when handling .zip archives within the Manager module engineConn. A remote attacker can upload a malicious archive and execute arbitrary files on the server once the archive is unpacked.
4) Deserialization of Untrusted Data (CVE-ID: CVE-2023-29216)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data. A remote user can leverage the MySQL data source and malicious parameters to
configure a new data source and execute arbitrary code on the system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Arbitrary file upload (CVE-ID: CVE-2023-27602)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload. A remote attacker can upload a malicious file and execute it on the server.
Remediation
Install update from vendor's website.
References
- https://lists.apache.org/thread/o682wz1ggq491ybvjwokxvcdtnzo76ls
- https://lists.apache.org/thread/3cr1cz3210wzwngldwrqzm43vwhghp0p
- https://lists.apache.org/thread/6n1vlvnyn441rm02zdqc0wnpckj8ltn8
- https://lists.apache.org/thread/18vv0m32oy51nzk8tbz13qdl5569y55l
- https://lists.apache.org/thread/wt70jfc0yfs6s5g0wg5dr5klnc48nsp1