First published: Sun Aug 21 2022(Updated: )
Apache Flume versions 1.4.0 through 1.10.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Flume | >=1.4.0<1.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34916 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2022-34916, upgrade Apache Flume to version 1.10.1 or later, ensuring that JNDI is configured securely.
Apache Flume versions 1.4.0 to 1.10.0 are affected by CVE-2022-34916 if configured with a JMS Source using a JNDI LDAP data source URI.
CVE-2022-34916 enables a remote code execution attack if an attacker gains control of the target LDAP server.
CVE-2022-34916 was disclosed in 2022 and involves vulnerabilities present in several versions of Apache Flume.