Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.
{ "nvd_published_at": "2022-10-26T16:15:00Z", "cwe_ids": [ "CWE-20", "CWE-502" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-10-27T18:39:05Z" }