Vulnerability Description
Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Flume | >= 1.4.0, < 1.10.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2022/06/14/1Mailing ListThird Party Advisory
- https://issues.apache.org/jira/browse/FLUME-3416Issue TrackingPatchVendor Advisory
- https://lists.apache.org/thread/16nf6b81zjpdc4y93ho99oxo83ddbsvgBroken Link
- http://www.openwall.com/lists/oss-security/2022/06/14/1Mailing ListThird Party Advisory
- https://issues.apache.org/jira/browse/FLUME-3416Issue TrackingPatchVendor Advisory
- https://lists.apache.org/thread/16nf6b81zjpdc4y93ho99oxo83ddbsvgBroken Link
FAQ
What is CVE-2022-25167?
CVE-2022-25167 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of...
How severe is CVE-2022-25167?
CVE-2022-25167 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-25167?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Flume.