First published: Thu Oct 19 2023(Updated: )
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong. This issue affects Apache InLong: from 1.4.0 through 1.8.0, the attacker can use \t to bypass. Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/8814
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache InLong | >=1.4.0<1.9.0 | |
maven/org.apache.inlong:manager-pojo | >=1.4.0<1.9.0 | 1.9.0 |
maven/org.apache.inlong:manager-common | >=1.4.0<1.9.0 | 1.9.0 |
>=1.4.0<1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-46227.
The severity of CVE-2023-46227 is not mentioned in the provided information.
CVE-2023-46227 affects Apache InLong versions 1.4.0 through 1.8.0.
To fix CVE-2023-46227, it is advised to upgrade to Apache InLong version 1.9.0 or apply the cherry-picked solution.
You can find more information about CVE-2023-46227 on the NIST National Vulnerability Database (NVD) website.