CVE-2022-25167
Summary
| CVE | CVE-2022-25167 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-06-14 08:15:00 UTC |
| Updated | 2022-06-27 16:42:00 UTC |
| Description | Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| N/A | CONFIRM | lists.apache.org | |
| [FLUME-3416] Improve input validation in JMSSource - ASF JIRA | CONFIRM | issues.apache.org | |
| oss-security - CVE-2022-25167 - Apache Flume JMSSource does not protect from malicious JNDI urls | MLIST | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 376702 Apache Flume JNDI Remote Code Execution (RCE) Vulnerability in JMSSource