Severity
9.8CRITICAL
EPSS
6.4%
top 8.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 26

Description

Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

CVEListV5apache_software_foundation/apache_flumeFlume JMSSource1.11.0
NVDapache/flume1.4.01.10.1

Patches

🔴Vulnerability Details

3
CVEList
Apache Flume prior to 1.11.0 has an Improper Input Validation (JNDI Injection) in JMSSource2022-10-26
GHSA
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL2022-10-26
OSV
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL2022-10-26
CVE-2022-42468 (CRITICAL CVSS 9.8) | Apache Flume versions 1.4.0 through | cvebase.io