Description
Apache Flume versions 1.4.0 through 1.10.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
Remediation
References
https://lists.apache.org/thread/qkmt4r2t9tbrxrdbjg1m2oczbvczd9zn
https://issues.apache.org/jira/browse/FLUME-3428
Related Vulnerabilities
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-beam-sql
CVE-2022-35916 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2022-36083 Vulnerability in maven package org.webjars.npm:jose
CVE-2023-30530 Vulnerability in maven package org.jenkins-ci.plugins:consul-kv-builder
CVE-2019-12418 Vulnerability in maven package org.apache.tomcat:tomcat-catalina-jmx-remote