Lucene search

K
githubGitHub Advisory DatabaseGHSA-H9MH-MGPV-GQMV
HistoryAug 22, 2022 - 12:00 a.m.

Remote code execution in Apache Flume

2022-08-2200:00:48
CWE-20
CWE-74
GitHub Advisory Database
github.com
21
apache flume
remote code execution
jms source
jndi
ldap
data source
uri
java protocol

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.6%

Apache Flume versions 1.4.0 through 1.10.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.

Affected configurations

Vulners
Node
org.apache.flume.flume-ng-sourcesflume-jms-sourceRange1.4.01.10.1
VendorProductVersionCPE
org.apache.flume.flume-ng-sourcesflume-jms-source*cpe:2.3:a:org.apache.flume.flume-ng-sources:flume-jms-source:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.6%