Description
In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/09/22/5
https://lists.apache.org/thread/r1r34y7bchrpmp9jhfdoohzdmk7pj1q1
Related Vulnerabilities
CVE-2023-33510 Vulnerability in maven package org.jeecgframework.p3:jeecg-p3-biz-chat
CVE-2019-1003042 Vulnerability in maven package org.6wind.jenkins:lockable-resources
CVE-2019-16548 Vulnerability in maven package org.jenkins-ci.plugins:google-compute-engine
CVE-2023-37943 Vulnerability in maven package org.jenkins-ci.plugins:active-directory
CVE-2022-1274 Vulnerability in maven package org.keycloak:keycloak-services