
Cloud Vulnerability DB
A community-led vulnerabilities database
Apache InLong, prior to version 1.3.0, was discovered to contain a deserialization vulnerability tracked as CVE-2022-40955. The vulnerability was discovered by security researcher 4ra1n of Chaitin Tech and was disclosed in September 2022. Apache InLong, which serves as a one-stop integration framework for massive data processing, was found to be susceptible to this security flaw when handling MySQL JDBC connection URL parameters (Security Online, OSS Security).
The vulnerability stems from improper handling of MySQL JDBC connection URL parameters deserialization in Apache InLong. The flaw is classified under CWE-502, which relates to deserialization of untrusted data. The issue specifically occurs when the system deserializes data from MySQL database connections, potentially allowing for unsafe deserialization of attacker-controlled content (NVD).
If successfully exploited, this vulnerability could lead to Remote Code Execution (RCE) on the Apache InLong server. This means an attacker could potentially execute arbitrary code on the affected system, compromising the security and integrity of the server (Security Online).
The vulnerability has been fixed in Apache InLong version 1.3.0. Users running affected versions are strongly advised to upgrade to version 1.3.0 or newer to mitigate this security risk (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."