In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/09/22/5 Mailing List Third Party Advisory
https://lists.apache.org/thread/r1r34y7bchrpmp9jhfdoohzdmk7pj1q1 Issue Tracking Mailing List Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: apache

Published: 2022-09-20T13:50:08

Updated: 2022-12-21T11:32:48.240Z

Reserved: 2022-09-19T00:00:00


Link: CVE-2022-40955

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-09-20T14:15:09.843

Modified: 2022-12-21T18:57:55.857


Link: CVE-2022-40955

JSON object: View

cve-icon Redhat Information

No data.

CWE