Lucene search

K
cve[email protected]CVE-2022-42468
HistoryOct 26, 2022 - 4:15 p.m.

CVE-2022-42468

2022-10-2616:15:11
CWE-20
CWE-74
web.nvd.nist.gov
56
3
apache flume
cve-2022-42468
rce
remote code execution
jms source
security vulnerability
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.7%

Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.

Affected configurations

Vulners
NVD
Node
apacheflumeRange≀1.11.0
CPENameOperatorVersion
apache:flumeapache flumele1.10.1

CNA Affected

[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Flume",
    "versions": [
      {
        "version": "Flume JMSSource",
        "status": "affected",
        "lessThan": "1.11.0",
        "versionType": "custom",
        "changes": [
          {
            "at": "1.4.0",
            "status": "affected"
          }
        ]
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.7%

Related for CVE-2022-42468