Lucene search

K
githubGitHub Advisory DatabaseGHSA-GPQQ-59RP-3C3W
HistoryMar 27, 2023 - 3:30 p.m.

Apache InLong vulnerable to JDBC Deserialization of Untrusted Data

2023-03-2715:30:16
CWE-502
GitHub Advisory Database
github.com
13
apache inlong
vulnerable
jdbc deserialization
untrusted data
mysql
authenticated users
patched
upgrade

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.4%

Apache InLong versions from 1.1.0 through 1.5.0 are vulnerable to Java Database Connectivity (JDBC) deserialization of untrusted data from the MySQL JDBC URL in MySQLDataNode. It could be triggered by authenticated users of InLong. This has been patched in version 1.6.0. Users are advised to upgrade to Apache InLong’s latest version or cherry-pick the patch to solve it.

Affected configurations

Vulners
Node
org.apache.inlonginlong-managerRange1.1.01.6.0
VendorProductVersionCPE
org.apache.inlonginlong-manager*cpe:2.3:a:org.apache.inlong:inlong-manager:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.4%

Related for GHSA-GPQQ-59RP-3C3W