Miggo Logo

CVE-2023-27602: Apache Linkis Unrestricted File Upload vulnerability

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.50566%
Published
7/6/2023
Updated
10/22/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.linkis:linkismaven< 1.3.21.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing path/file-type validation in the PublicService module's file upload functionality. While exact function names aren't provided in disclosures, the mitigation via wds.linkis.workspace.filesystem.*.check properties implies:

  1. A controller method (e.g., PublicService.uploadFile) handles upload requests
  2. A filesystem utility (e.g., FilesystemHelper.saveFile) persists files without inherent validation Confidence is medium due to lack of direct code references, but alignment with standard Java web app patterns and Apache's mitigation guidance.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *p**** Linkis <=*.*.*, T** Pu*li*S*rvi** mo*ul* uplo**s *il*s wit*out r*stri*tions on t** p*t* to t** uplo**** *il*s, *n* *il* typ*s. W* r**omm*n* us*rs up*r*** t** v*rsion o* Linkis to v*rsion *.*.*.  *or v*rsions <=*.*.*, w* su***st turnin* on

Reasoning

T** vuln*r**ility st*ms *rom missin* p*t*/*il*-typ* v*li**tion in t** Pu*li*S*rvi** mo*ul*'s *il* uplo** *un*tion*lity. W*il* *x**t *un*tion n*m*s *r*n't provi*** in *is*losur*s, t** miti**tion vi* `w*s.linkis.worksp***.*il*syst*m.*.****k` prop*rti*s