CVE-2022-42468
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
26/10/2022
Last modified:
07/05/2025
Description
Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:flume:*:*:*:*:*:*:*:* | 1.4.0 (including) | 1.10.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://issues.apache.org/jira/browse/FLUME-3437
- https://lists.apache.org/thread/1ckhmp539zr2nd2rs45pocpywk2d9zvz
- https://lists.apache.org/thread/939wkx8o90bp6m2ht3t1sdyo1ncypl78
- https://issues.apache.org/jira/browse/FLUME-3437
- https://lists.apache.org/thread/1ckhmp539zr2nd2rs45pocpywk2d9zvz
- https://lists.apache.org/thread/939wkx8o90bp6m2ht3t1sdyo1ncypl78



