Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.11.0,
the attackers can bypass using malicious parameters.
Users are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it.
[1] https://github.com/apache/inlong/pull/9694
[2] https://github.com/apache/inlong/pull/9707
Metrics
Affected Vendors & Products
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache Software Foundation
Apache Software Foundation apache Inlong |
|
| CPEs | cpe:2.3:a:apache_software_foundation:apache_inlong:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache Software Foundation
Apache Software Foundation apache Inlong |
|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.11.0, the attackers can bypass using malicious parameters. Users are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it. [1] https://github.com/apache/inlong/pull/9694 [2] https://github.com/apache/inlong/pull/9707 | Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.11.0, the attackers can bypass using malicious parameters. Users are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it. [1] https://github.com/apache/inlong/pull/9694 [2] https://github.com/apache/inlong/pull/9707 |
Tue, 11 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache inlong |
|
| CPEs | cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache inlong |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: apache
Published: 2024-05-08T15:06:23.829Z
Updated: 2025-03-28T18:52:24.649Z
Reserved: 2024-02-19T09:14:11.118Z
Link: CVE-2024-26579
Updated: 2024-08-02T00:07:19.519Z
Status : Modified
Published: 2024-05-08T15:15:08.817
Modified: 2025-03-28T19:15:20.193
Link: CVE-2024-26579
No data.