QID 376702
Date Published: 2022-06-29
QID 376702: Apache Flume JNDI Remote Code Execution (RCE) Vulnerability in JMSSource
Apache Flume vulnerable to a JNDI RCE in JMSSource. Flume's JMSSource class can be configured with a connection factory name. A JNDI lookup is performed on this name without performing a validation. This could result in untrusted data being deserialized. Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server.
Affected Versions:
Apache Flume versions 1.4.0 through 1.9.0
QID Detection Logic:(authenticated)
This QID checks for Flume version by using the command flume version.
A JNDI lookup is performed on this name without performing a validation. This could result in untrusted data being deserialized.
In releases 1.4.0 through 1.9.0 the JMSSource should not be used.
- Apache Flume -
flume.apache.org/security.html
CVEs related to QID 376702
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Apache Flume |
|