QID 376702

Date Published: 2022-06-29

QID 376702: Apache Flume JNDI Remote Code Execution (RCE) Vulnerability in JMSSource

Apache Flume vulnerable to a JNDI RCE in JMSSource. Flume's JMSSource class can be configured with a connection factory name. A JNDI lookup is performed on this name without performing a validation. This could result in untrusted data being deserialized. Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server.

Affected Versions:
Apache Flume versions 1.4.0 through 1.9.0

QID Detection Logic:(authenticated)
This QID checks for Flume version by using the command flume version.

A JNDI lookup is performed on this name without performing a validation. This could result in untrusted data being deserialized.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Upgrade to Flume 1.10.0.
    In releases 1.4.0 through 1.9.0 the JMSSource should not be used.
    Vendor References

    CVEs related to QID 376702

    Software Advisories
    Advisory ID Software Component Link
    Apache Flume URL Logo flume.apache.org/security.html