Vulnerability Details : CVE-2023-41916
In Apache Linkis =1.4.0, due to the lack of effective filtering
of parameters, an attacker configuring malicious Mysql JDBC parameters in the DataSource Manager Module will trigger arbitrary file reading. Therefore, the parameters in the Mysql JDBC URL should be blacklisted. This attack requires the attacker to obtain an authorized account from Linkis before it can be carried out. Versions of Apache Linkis = 1.4.0 will be affected.Â
We recommend users upgrade the version of Linkis to version 1.5.0.
Products affected by CVE-2023-41916
- cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-41916
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41916
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-03-14 |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | 2024-07-16 |
CWE ids for CVE-2023-41916
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by:
- f0158376-9dc2-43b6-827c-5f631a4d8d09 (Primary)
- security@apache.org (Secondary)
References for CVE-2023-41916
-
http://www.openwall.com/lists/oss-security/2024/07/13/4
oss-security - CVE-2023-41916: Apache Linkis DataSource: DatasourceManager module has a JDBC parameter judgment logic vulnerability that allows for arbitrary file reading
-
https://lists.apache.org/thread/dxkpwyoxy1jpdwlpqp15zvo0jxn4v729
CVE-2023-41916: Apache Linkis DataSource: DatasourceManager module has a JDBC parameter judgment logic vulnerability that allows for arbitrary file reading-Apache Mail ArchivesMailing List;Vendor Advisory
Jump to