First published: Tue Jun 14 2022(Updated: )
Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.flume.flume-ng-sources:flume-jms-source | >=1.4.0<1.10.0 | 1.10.0 |
Apache Flume | >=1.4.0<1.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25167 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2022-25167, upgrade Apache Flume to version 1.10.0 or later.
Apache Flume versions 1.4.0 through 1.9.0 are affected by CVE-2022-25167.
CVE-2022-25167 is associated with remote code execution (RCE) attacks.
The vulnerability CVE-2022-25167 involves the JMS Source when configured with a JNDI LDAP data source URI.