Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yNm00LXFqcDkteG1jNs4AAu9b

Apache InLong vulnerable to Deserialization of Untrusted Data

In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer.

Permalink: https://github.com/advisories/GHSA-26m4-qjp9-xmc6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yNm00LXFqcDkteG1jNs4AAu9b
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: 8 months ago


CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-26m4-qjp9-xmc6, CVE-2022-40955
References:

Affected Packages

maven:org.apache.inlong:inlong-common
Versions: < 1.3.0
Fixed in: 1.3.0