CVE-2024-45627

5.9 MEDIUM

📋 TL;DR

This vulnerability in Apache Linkis allows authenticated attackers to read arbitrary files from the server by injecting malicious MySQL JDBC parameters. It affects Apache Linkis versions before 1.7.0. Attackers need valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Apache Linkis
Versions: All versions < 1.7.0
Operating Systems: All operating systems running Apache Linkis
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have authorized account access to Linkis DataSource Manager Module

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive server files including configuration files, credentials, and system files could be exfiltrated, potentially leading to full system compromise.

🟠

Likely Case

Attackers with legitimate access could read configuration files containing database credentials, API keys, or other sensitive information stored on the Linkis server.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to files accessible by the Linkis service account.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once credentials are obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.0

Vendor Advisory: https://lists.apache.org/thread/0zzx8lldwoqgzq98mg61hojgpvn76xsh

Restart Required: Yes

Instructions:

1. Download Apache Linkis 1.7.0 or later from official Apache repository. 2. Stop Linkis services. 3. Backup current configuration. 4. Deploy new version. 5. Restart Linkis services.

🔧 Temporary Workarounds

MySQL JDBC Parameter Filtering

all

Implement input validation to filter or block malicious MySQL JDBC parameters in DataSource Manager Module

Access Restriction

all

Restrict DataSource Manager Module access to only trusted users who require MySQL database connectivity

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for DataSource Manager Module operations
  • Apply network segmentation to isolate Linkis servers from sensitive file storage

🔍 How to Verify

Check if Vulnerable:

Check Linkis version using administrative interface or configuration files

Check Version:

Check linkis.properties or Linkis web interface for version information

Verify Fix Applied:

Verify Linkis version is 1.7.0 or higher and test MySQL JDBC parameter injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual MySQL JDBC connection attempts with suspicious parameters
  • Multiple file read operations from unexpected locations

Network Indicators:

  • Unexpected outbound file transfers from Linkis servers

SIEM Query:

source="linkis" AND (jdbc OR mysql) AND (parameter OR config) AND (read OR file)

🔗 References

📤 Share & Export