CVE-2022-42468
Severity
9.8CRITICAL
EPSS
6.4%
top 8.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 26
Description
Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
3CVEList▶
Apache Flume prior to 1.11.0 has an Improper Input Validation (JNDI Injection) in JMSSource↗2022-10-26
GHSA▶
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL↗2022-10-26
OSV▶
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL↗2022-10-26