First published: Wed Oct 26 2022(Updated: )
Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Flume | >=1.4.0<=1.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42468 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2022-42468, upgrade Apache Flume to version 1.10.2 or later, ensuring that the providerURL used with JMS Source is safe.
CVE-2022-42468 affects all Apache Flume versions from 1.4.0 to 1.10.1 that utilize an unsafe providerURL in their configuration.
CVE-2022-42468 allows for remote code execution (RCE) attacks that can compromise the system running Apache Flume.
Mitigation strategies for CVE-2022-42468 include restricting the use of JNDI to only allow the java protocol or eliminating the use of protocols altogether.