Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apache InLong < 1.12.0 JDBC反序列化漏洞 #214

Open
foyaga opened this issue May 9, 2024 · 0 comments
Open

Apache InLong < 1.12.0 JDBC反序列化漏洞 #214

foyaga opened this issue May 9, 2024 · 0 comments
Labels
watchvuln watchvuln推送

Comments

@foyaga
Copy link
Owner

foyaga commented May 9, 2024

漏洞描述:

Apache InLong 是开源的高性能数据集成框架,用于业务构建基于流式的数据分析、建模和应用。
受影响版本中,由于 MySQLSensitiveUrlUtils 类只限制了?形式的JDBC连接字符串参数,攻击者可通过()规避?引入autoDeserialize、allowLoadLocalInfile等额外的参数。并通过#注释后续内容,绕过从而此前修复过滤逻辑,在连接攻击者可控的服务地址时,攻击者可利用该漏洞远程执行任意代码。

参考链接:

  1. https://www.oscs1024.com/hd/MPS-7rbq-ze46
  2. https://nvd.nist.gov/vuln/detail/CVE-2024-26579
  3. https://lists.apache.org/thread/d2hndtvh6bll4pkl91o2oqxyynhr54k3
  4. apache/inlong@a59a814
  5. apache/inlong@eef8d05
  6. [Improve][Manager] Optimize MySQL JDBC URL check apache/inlong#9689
@foyaga foyaga added the watchvuln watchvuln推送 label May 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
watchvuln watchvuln推送
Projects
None yet
Development

No branches or pull requests

1 participant