We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-34434

Apache InLong: JDBC URL bypassing by allowLoadLocalInfileInPath param



Assignerapache
Reserved2023-06-06
Published2023-07-25
Updated2024-10-02

Description

Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0.  The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8130 .

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

1.4.0
affected

Credits

sw0rd1ight and 4ra1n of Chaitin Tech 0x4006a2e1b0

References

https://lists.apache.org/thread/7f1o71w5r732cspltmtdydn01gllf4jo vendor-advisory

http://seclists.org/fulldisclosure/2023/Jul/43

http://www.openwall.com/lists/oss-security/2023/07/25/3

cve.org CVE-2023-34434

nvd.nist.gov CVE-2023-34434

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.