|
Message-ID: <8dcf2ad6-d544-974c-b11e-3d8ed44c7dbf@apache.org> Date: Tue, 25 Jul 2023 02:29:50 +0000 From: Charles Zhang <dockerzhang@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-34434: Apache InLong: JDBC URL bypassing by allowLoadLocalInfileInPath param Severity: important Affected versions: - Apache InLong 1.4.0 through 1.7.0 Description: Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8130 . Credit: sw0rd1ight and 4ra1n of Chaitin Tech (finder) References: https://inlong.apache.org https://www.cve.org/CVERecord?id=CVE-2023-34434
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.