Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.
This issue affects Apache InLong: from 1.4.0 through 1.8.0, the attacker can use \t to bypass. Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it.
[1] https://github.com/apache/inlong/pull/8814
References
Link | Resource |
---|---|
https://lists.apache.org/thread/m8txor4f76tmrxksrmc87tw42g57nz33 | Mailing List |
Configurations
History
25 Oct 2023, 16:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache inlong
Apache |
|
CPE | cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://lists.apache.org/thread/m8txor4f76tmrxksrmc87tw42g57nz33 - Mailing List |
19 Oct 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-19 10:15
Updated : 2024-09-12 21:35
NVD link : CVE-2023-46227
Mitre link : CVE-2023-46227
CVE.ORG link : CVE-2023-46227
JSON object : View
Products Affected
apache
- inlong
CWE
CWE-502
Deserialization of Untrusted Data