
Cloud Vulnerability DB
A community-led vulnerabilities database
Apache Flume versions 1.4.0 through 1.9.0 were identified with a remote code execution (RCE) vulnerability, tracked as CVE-2022-25167. The vulnerability was discovered by the Flume development team and publicly disclosed on June 14, 2022. The issue affects configurations that use a JMS Source with a JNDI LDAP data source URI, particularly when an attacker has control of the target LDAP server (CVE Details).
The vulnerability exists in Flume's JMSSource class, which can be configured with a connection factory name. The core issue lies in the JNDI lookup process, which is performed on this name without proper validation, potentially leading to the deserialization of untrusted data. The severity of this vulnerability is classified as medium (Openwall).
When exploited, this vulnerability could allow attackers to execute remote code on affected systems through the deserialization of untrusted data when using the JMS Source component with JNDI LDAP data source URIs (NVD).
The vulnerability has been fixed in Apache Flume version 1.10.0, which implements stricter protocol validation. In the new version, if a protocol is specified in the connection factory parameter, only the java protocol is allowed. If no protocol is specified, it is also allowed. For versions 1.4.0 through 1.9.0, it is recommended not to use the JMSSource component (Openwall).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."