[MAVEN:GHSA-9W4G-FP9H-3Q2V] Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 1

Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.

ID
MAVEN:GHSA-9W4G-FP9H-3Q2V
Severity
critical
URL
https://github.com/advisories/GHSA-9w4g-fp9h-3q2v
Published
2022-10-26T19:00:38
(23 months ago)
Modified
2023-07-28T20:31:00
(13 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.apache.flume.flume-ng-sources/flume-jms-source org.apache.flume.flume-ng-sources flume-jms-source < 1.11.0
Fixed pkg:maven/org.apache.flume.flume-ng-sources/flume-jms-source org.apache.flume.flume-ng-sources flume-jms-source = 1.11.0
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...