First published: Mon Mar 27 2023(Updated: )
Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong. It could be triggered by authenticated users of InLong, you could refer to [1] to know more about this vulnerability. This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick [2] to solve it. [1] https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html [2] https://github.com/apache/inlong/pull/7422 https://github.com/apache/inlong/pull/7422
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache InLong | >=1.1.0<=1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-27296.
The title of this vulnerability is 'Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong.'
This vulnerability can be triggered by authenticated users of InLong.
This vulnerability affects Apache InLong versions 1.1.0 through 1.5.0.
The severity level of this vulnerability is high (8.8).
Users are advised to upgrade their Apache InLong installation to a version higher than 1.5.0.
The Common Weakness Enumeration (CWE) ID associated with this vulnerability is 502.