[MAVEN:GHSA-9W4G-FP9H-3Q2V] Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL
Severity
Critical
Affected Packages
1
Fixed Packages
1
CVEs
1
Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.
Package | Affected Version |
---|---|
pkg:maven/org.apache.flume.flume-ng-sources/flume-jms-source | < 1.11.0 |
Package | Fixed Version |
---|---|
pkg:maven/org.apache.flume.flume-ng-sources/flume-jms-source | = 1.11.0 |
- ID
- MAVEN:GHSA-9W4G-FP9H-3Q2V
- Severity
- critical
- URL
- https://github.com/advisories/GHSA-9w4g-fp9h-3q2v
- Published
-
2022-10-26T19:00:38
(23 months ago) - Modified
-
2023-07-28T20:31:00
(13 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.apache.flume.flume-ng-sources/flume-jms-source | org.apache.flume.flume-ng-sources | flume-jms-source | < 1.11.0 | |||
Fixed | pkg:maven/org.apache.flume.flume-ng-sources/flume-jms-source | org.apache.flume.flume-ng-sources | flume-jms-source | = 1.11.0 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |