Lucene search

K
cve[email protected]CVE-2022-34916
HistoryAug 21, 2022 - 9:15 a.m.

CVE-2022-34916

2022-08-2109:15:33
CWE-20
web.nvd.nist.gov
90
11
cve-2022-34916
apache flume
rce
jms source
jndi
ldap

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.3%

Apache Flume versions 1.4.0 through 1.10.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.

Affected configurations

Vulners
NVD
Node
apacheflumeRange1.11.0
CPENameOperatorVersion
apache:flumeapache flumelt1.10.1

CNA Affected

[
  {
    "product": "Apache Flume",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "changes": [
          {
            "at": "1.4.0",
            "status": "affected"
          }
        ],
        "lessThan": "1.11.0",
        "status": "affected",
        "version": "flume-jms-source",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.3%