Vulnerability Details : CVE-2023-27296
Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong. It could be triggered by authenticated users of InLong, you could refer to [1] to know more about this vulnerability. This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick [2] to solve it. [1] https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html [2] https://github.com/apache/inlong/pull/7422 https://github.com/apache/inlong/pull/7422
Products affected by CVE-2023-27296
- cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-27296
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-27296
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-27296
-
The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.Assigned by: security@apache.org (Primary)
References for CVE-2023-27296
-
https://lists.apache.org/thread/xbvtjw9bwzgbo9fp1by8o3p49nf59xzt
CVE-2023-27296: Apache InLong: JDBC Deserialization Vulnerability in InLong-Apache Mail ArchivesMailing List;Patch;Vendor Advisory
Jump to