Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7069 | Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol. |
Github GHSA |
GHSA-9w4g-fp9h-3q2v | Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL |
Wed, 07 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-05-07T13:53:00.467Z
Reserved: 2022-10-07T00:00:00.000Z
Link: CVE-2022-42468
Updated: 2024-08-03T13:10:40.919Z
Status : Modified
Published: 2022-10-26T16:15:11.823
Modified: 2025-05-07T14:15:33.433
Link: CVE-2022-42468
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA