Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8dcf2ad6-d544-974c-b11e-3d8ed44c7dbf@apache.org>
Date: Tue, 25 Jul 2023 02:29:50 +0000
From: Charles Zhang <dockerzhang@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-34434: Apache InLong: JDBC URL bypassing by
 allowLoadLocalInfileInPath param 

Severity: important

Affected versions:

- Apache InLong 1.4.0 through 1.7.0

Description:

Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. 

The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick  https://github.com/apache/inlong/pull/8130 .

Credit:

sw0rd1ight and 4ra1n of Chaitin Tech (finder)

References:

https://inlong.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-34434

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.