Description
In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6654 | In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer. |
Github GHSA |
GHSA-26m4-qjp9-xmc6 | Apache InLong vulnerable to Deserialization of Untrusted Data |
References
History
Thu, 29 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-05-29T13:55:00.126Z
Reserved: 2022-09-19T00:00:00.000Z
Link: CVE-2022-40955
Updated: 2024-08-03T12:28:42.942Z
Status : Modified
Published: 2022-09-20T14:15:09.843
Modified: 2025-05-29T14:15:29.900
Link: CVE-2022-40955
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA