Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL
Critical severity
GitHub Reviewed
Published
Oct 26, 2022
to the GitHub Advisory Database
•
Updated Jul 28, 2023
Package
Affected versions
< 1.11.0
Patched versions
1.11.0
Description
Published by the National Vulnerability Database
Oct 26, 2022
Published to the GitHub Advisory Database
Oct 26, 2022
Reviewed
Oct 27, 2022
Last updated
Jul 28, 2023
Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.
References