Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"state": "PUBLISHED", "cveId": "CVE-2022-42468", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "dateUpdated": "2025-05-07T13:53:00.467Z", "dateReserved": "2022-10-07T00:00:00.000Z", "datePublished": "2022-10-26T00:00:00.000Z"}, "containers": {"cna": {"title": "Apache Flume prior to 1.11.0 has an Improper Input Validation (JNDI Injection) in JMSSource", "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2022-10-26T00:00:00.000Z"}, "descriptions": [{"lang": "en", "value": "Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol."}], "affected": [{"vendor": "Apache Software Foundation", "product": "Apache Flume", "versions": [{"version": "Flume JMSSource", "status": "affected", "lessThan": "1.11.0", "versionType": "custom", "changes": [{"at": "1.4.0", "status": "affected"}]}]}], "references": [{"url": "https://issues.apache.org/jira/browse/FLUME-3437"}, {"url": "https://lists.apache.org/thread/939wkx8o90bp6m2ht3t1sdyo1ncypl78"}, {"url": "https://lists.apache.org/thread/1ckhmp539zr2nd2rs45pocpywk2d9zvz"}], "problemTypes": [{"descriptions": [{"type": "CWE", "lang": "en", "description": "CWE-20 Improper Input Validation", "cweId": "CWE-20"}]}, {"descriptions": [{"type": "CWE", "lang": "en", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", "cweId": "CWE-74"}]}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "source": {"defect": ["FLUME-3437"], "discovery": "UNKNOWN"}, "timeline": [{"lang": "en", "time": "2022-08-22T00:00:00", "value": "Reported"}, {"lang": "en", "time": "2022-09-13T00:00:00", "value": "Forwarded to Flume PMC"}, {"lang": "en", "time": "2022-09-14T00:00:00", "value": "Report validated"}, {"lang": "en", "time": "2022-09-23T00:00:00", "value": "Fix committed"}, {"lang": "en", "time": "2022-10-24T00:00:00", "value": "Release available"}]}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T13:10:40.919Z"}, "title": "CVE Program Container", "references": [{"url": "https://issues.apache.org/jira/browse/FLUME-3437", "tags": ["x_transferred"]}, {"url": "https://lists.apache.org/thread/939wkx8o90bp6m2ht3t1sdyo1ncypl78", "tags": ["x_transferred"]}, {"url": "https://lists.apache.org/thread/1ckhmp539zr2nd2rs45pocpywk2d9zvz", "tags": ["x_transferred"]}]}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2025-05-07T13:52:39.109692Z", "id": "CVE-2022-42468", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-05-07T13:53:00.467Z"}}]}}