Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.11.0,
the attackers can bypass using malicious parameters.
Users are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it.
[1] https://github.com/apache/inlong/pull/9694
[2] https://github.com/apache/inlong/pull/9707
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2024/05/09/2 | Mailing List |
| https://github.com/advisories/GHSA-fgh3-pwmp-3qw3 | Vendor Advisory |
| https://lists.apache.org/thread/d2hndtvh6bll4pkl91o2oqxyynhr54k3 | Mailing List |
| http://www.openwall.com/lists/oss-security/2024/05/09/2 | Mailing List |
| https://github.com/advisories/GHSA-fgh3-pwmp-3qw3 | Vendor Advisory |
| https://lists.apache.org/thread/d2hndtvh6bll4pkl91o2oqxyynhr54k3 | Mailing List |
Configurations
History
No history.
Information
Published : 2024-05-08 15:15
Updated : 2025-03-28 19:15
NVD link : CVE-2024-26579
Mitre link : CVE-2024-26579
CVE.ORG link : CVE-2024-26579
JSON object : View
Products Affected
apache
- inlong
CWE
CWE-502
Deserialization of Untrusted Data
