Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-40955 |
CWE-ID | CWE-502 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Apache InLong Server applications / Other server solutions |
Vendor | Apache Foundation |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU67596
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-40955
CWE-ID:
CWE-502 - Deserialization of Untrusted Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing MySQL JDBC connection URL parameters. A remote attacker can pass specially crafted serialized connection string to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsApache InLong: 0.3.0 - 1.2.0
http://lists.apache.org/thread/r1r34y7bchrpmp9jhfdoohzdmk7pj1q1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?