Lucene search

K
githubGitHub Advisory DatabaseGHSA-9W4G-FP9H-3Q2V
HistoryOct 26, 2022 - 7:00 p.m.

Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL

2022-10-2619:00:38
CWE-20
CWE-502
GitHub Advisory Database
github.com
25
apache flume
jmssource
remote code execution
vulnerability
deserialization
rce
jndi lookup
providerurl
version 1.11.0
software

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.5%

Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.

Affected configurations

Vulners
Node
org.apache.flume.flume-ng-sourcesflume-jms-sourceRange<1.11.0
VendorProductVersionCPE
org.apache.flume.flume-ng-sourcesflume-jms-source*cpe:2.3:a:org.apache.flume.flume-ng-sources:flume-jms-source:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.5%

Related for GHSA-9W4G-FP9H-3Q2V