Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9w4g-fp9h-3q2v

Опубликовано: 26 окт. 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL

Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.

Пакеты

Наименование

org.apache.flume.flume-ng-sources:flume-jms-source

maven
Затронутые версииВерсия исправления

< 1.11.0

1.11.0

EPSS

Процентиль: 83%
0.01883
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
больше 3 лет назад

Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.

EPSS

Процентиль: 83%
0.01883
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502