Skip to content

Remote Code Execution in Apache Flume

High severity GitHub Reviewed Published Jun 15, 2022 to the GitHub Advisory Database • Updated Jul 28, 2023

Package

maven org.apache.flume.flume-ng-sources:flume-jms-source (Maven)

Affected versions

>= 1.4.0, < 1.10.0

Patched versions

1.10.0

Description

Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.

References

Published by the National Vulnerability Database Jun 14, 2022
Published to the GitHub Advisory Database Jun 15, 2022
Reviewed Jun 17, 2022
Last updated Jul 28, 2023

Severity

High

EPSS score

0.265%
(65th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2022-25167

GHSA ID

GHSA-x5m7-rwfx-w7qm

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.