Vulnerability Description
Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.8.0 through 1.10.0, the attackers can use the specific payload to read from an arbitrary file. Users are advised to upgrade to Apache InLong's 1.11.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/9673
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Inlong | >= 1.4.0, < 1.11.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2024/03/06/1Mailing List
- https://lists.apache.org/thread/xvomf66l58x4dmoyzojflvx52gkzcdmkVendor Advisory
- http://www.openwall.com/lists/oss-security/2024/03/06/1Mailing List
- https://lists.apache.org/thread/xvomf66l58x4dmoyzojflvx52gkzcdmkVendor Advisory
FAQ
What is CVE-2024-26580?
CVE-2024-26580 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.8.0 through 1.10.0, the attackers can use the specific payload to read from an arbitrary fil...
How severe is CVE-2024-26580?
CVE-2024-26580 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-26580?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Inlong.