First published: Tue Jul 25 2023(Updated: )
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8130 .
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache InLong | >=1.4.0<=1.7.0 | |
maven/org.apache.inlong:manager-pojo | >=1.4.0<1.8.0 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34434 is a vulnerability in Apache InLong, allowing JDBC URL bypassing by the allowLoadLocalInfileInPath parameter.
Apache InLong versions 1.4.0 through 1.7.0 are affected by CVE-2023-34434.
An attacker can exploit CVE-2023-34434 by bypassing the current logic and achieving arbitrary file reading.
To fix CVE-2023-34434, users are advised to upgrade to Apache InLong version 1.8.0 or later.
CVE-2023-34434 has a severity level of 7.5 (high).