Description
Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7069 | Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol. |
Github GHSA |
GHSA-9w4g-fp9h-3q2v | Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL |
References
History
Wed, 07 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-05-07T13:53:00.467Z
Reserved: 2022-10-07T00:00:00.000Z
Link: CVE-2022-42468
Updated: 2024-08-03T13:10:40.919Z
Status : Modified
Published: 2022-10-26T16:15:11.823
Modified: 2025-05-07T14:15:33.433
Link: CVE-2022-42468
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA