Headline
GHSA-9w4g-fp9h-3q2v: Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL
Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL
Moderate severity GitHub Reviewed Published Oct 26, 2022 • Updated Oct 27, 2022