First published: Wed Oct 26 2022(Updated: )
Apache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 are vulnerable to a Denial of Service attack when accepting untrusted patterns for REGEXP queries with Java 8. Users should upgrade to 0.13.3 which addresses this issue or use a later version of Java to avoid it.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache IoTDB | >=0.12.2<=0.12.6 | |
Apache IoTDB | >=0.13.0<=0.13.2 | |
maven/org.apache.iotdb:tsfile | >=0.12.2<0.13.3 | 0.13.3 |
maven/org.apache.iotdb:iotdb-server | >=0.12.2<0.13.3 | 0.13.3 |
pip/apache-iotdb | >=0.12.2<0.13.3 | 0.13.3 |
maven/org.apache.iotdb:flink-tsfile-connector | >=0.12.2<0.13.3 | 0.13.3 |
>=0.12.2<=0.12.6 | ||
>=0.13.0<=0.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-43766 is high with a CVSS score of 7.5.
The vulnerability ID for Apache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 is CVE-2022-43766.
To mitigate the Denial of Service vulnerability in Apache IoTDB, users should upgrade to version 0.13.3 or use a later version of Java.
The affected software for CVE-2022-43766 is Apache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2.
More information about CVE-2022-43766 can be found at this reference: [link](https://lists.apache.org/thread/9pgpb82p5brooy41n8l5q0y9h33db2zn).