Deserialization of untrused data in Apache InLong

Published: 2022-09-22
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-40955
Exploitation vector Network
Public exploit N/A
Vulnerable software
Apache InLong
Server applications / Other server solutions

Vendor Apache Foundation

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Deserialization of Untrusted Data

EUVDB-ID: #VU67596

Risk: Medium


CVE-ID: CVE-2022-40955

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No


The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing MySQL JDBC connection URL parameters. A remote attacker can pass specially crafted serialized connection string to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Install updates from vendor's website.

Vulnerable software versions

Apache InLong: 0.3.0 - 1.2.0

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?