Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-9w4g-fp9h-3q2v: Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL

Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.

ghsa
#apache#git#rce

Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL

Moderate severity GitHub Reviewed Published Oct 26, 2022 • Updated Oct 27, 2022

ghsa: Latest News

GHSA-5jfw-gq64-q45f: HTML Cleaner allows crafted scripts in special contexts like svg or math to pass through