{"id":2977,"date":"2025-05-29T15:37:12","date_gmt":"2025-05-29T15:37:12","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=2977"},"modified":"2025-05-29T15:37:12","modified_gmt":"2025-05-29T15:37:12","slug":"apache-inlong-jdbc-vulnerability-allows-deserialization-of-untrusted-information","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=2977","title":{"rendered":"Apache InLong JDBC Vulnerability Allows Deserialization of Untrusted Information"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A moderate-severity vulnerability, tracked as<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27522\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> CVE-2025-27522<\/a>, has been disclosed in Apache InLong, a preferred knowledge integration platform. <\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/lists.apache.org\/thread\/s4dnmq3gwcjocxf85qk190knlzd26jby\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The flaw,<\/a> affecting variations 1.13.0 by means of 2.1.0, facilities on the <em>deserialization of untrusted knowledge<\/em> throughout JDBC (Java Database Connectivity) verification processing. <\/p>\n<p>This vulnerability is assessed as a <em>secondary mining bypass<\/em> for the beforehand reported CVE-2024-26579, indicating that earlier patches have been inadequate and attackers can nonetheless exploit the system by means of various vectors.<\/p>\n<div class=\"td-a-ad id_inline_ad0 id_ad_content-horiz-center\"><span class=\"td-adspot-title\">&#8211; Commercial &#8211;<\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgtF4v5Ejzb9hD6O8UG7KJJziqO1ZP5zcUuKXNsyjb4g3FugqSKlBjBKmUNqGCjtqOq8kEb1lM6uZOBXm0lUCSTqXKyP4hz81q77L_k5I4RBy3afKYWuunQXOVo9zA4MFlD75XmYOjxT0sNIO9RR8UZPin1ZBVShx5Xj-5D9SyEp0QgEPoA6vxXp3Q4DInb\/s16000\/Don%E2%80%99t%20miss%20our%20latest%20stories%20on%20Google%20News%20(1).png&#10;\" alt=\"Google News\"\/><\/a><\/div>\n<p>Deserialization vulnerabilities happen when an utility processes knowledge that may be manipulated by an attacker, permitting them to execute arbitrary code or entry delicate info. <\/p>\n<p>On this case, the vulnerability permits risk actors to bypass safety mechanisms within the InLong JDBC part, probably resulting in unauthorized knowledge manipulation or info disclosure.<\/p>\n<h2 class=\"wp-block-heading\" id=\"technical-details-and-impact\"><strong>Technical Particulars and Influence<\/strong><\/h2>\n<p>The vulnerability is rooted in the way in which Apache InLong handles serialized knowledge throughout verification. <\/p>\n<p>Particularly, the system fails to adequately validate or sanitize incoming serialized objects, opening the door for attackers to craft malicious payloads. <\/p>\n<p>When these payloads are deserialized, they will set off unintended behaviors, resembling arbitrary file studying or code execution.<\/p>\n<p>The Frequent Weak point Enumeration (CWE) identifier for this challenge is CWE-502: <em>Deserialization of Untrusted Information<\/em>. <\/p>\n<p>The vulnerability is network-exploitable and doesn&#8217;t require consumer interplay, with a CVSS v3.1 base rating estimated between 5.3 and 6.5, reflecting a reasonable to excessive threat profile. <\/p>\n<p>Though there may be at the moment no public<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/poc-exploit-cve-2020-0601\/\" target=\"_blank\" rel=\"noreferrer noopener\"> proof-of-concept <\/a>or proof of energetic exploitation, the potential for knowledge breaches or system compromise stays vital.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Affected Variations and Elements<\/strong><\/h2>\n<p>The next desk summarizes the affected merchandise and really useful remediation steps:<\/p>\n<figure class=\"wp-block-table\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th>Affected Software program<\/th>\n<th>Affected Variations<\/th>\n<th>Mounted Model \/ Patch<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Apache InLong<\/td>\n<td>1.13.0 \u2013 2.1.0<\/td>\n<td>2.2.0 or cherry-pick #11732<\/td>\n<\/tr>\n<tr>\n<td>maven\/org.apache.inlong:manager-pojo<\/td>\n<td>1.13.0 \u2013 2.2.0<\/td>\n<td>2.2.0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"mitigation-and-recommendations\"><strong>Mitigation and Suggestions<\/strong><\/h2>\n<p>To handle CVE-2025-27522, Apache advises all customers to improve to model 2.2.0 of InLong or apply the patch accessible in GitHub pull request #11732. <\/p>\n<p>Extra greatest practices embrace:<\/p>\n<ul class=\"wp-block-list\">\n<li>Implementing strict enter validation and sanitization for all deserialization processes.<\/li>\n<li>Proscribing and validating sources of serialized knowledge.<\/li>\n<li>Monitoring and auditing system logs for indicators of exploitation makes an attempt.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>Pattern Code Snippet for Secure Deserialization<\/strong><\/h2>\n<p>Under is a simplified Java instance for secure deserialization, emphasizing enter validation:<\/p>\n<pre class=\"wp-block-preformatted\">java<code>ObjectInputStream ois = new ObjectInputStream(new FileInputStream(\"enter.ser\"));\nObject obj = ois.readObject();\nif (obj instanceof ExpectedClass) {\n    <em>\/\/ Secure to proceed<\/em>\n    ExpectedClass knowledge = (ExpectedClass) obj;\n} else {\n    throw new SecurityException(\"Surprising object sort!\");\n}\nois.shut();\n<\/code><\/pre>\n<p>This strategy ensures solely anticipated object sorts are processed, decreasing the chance of arbitrary code execution.<\/p>\n<h2 class=\"wp-block-heading\" id=\"conclusion-urgent-need-for-patch-adoption\"><strong>Pressing Want for Patch Adoption<\/strong><\/h2>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27522\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2025-27522<\/a> underscores the persistent dangers related to deserialization vulnerabilities in enterprise software program. <\/p>\n<p>Whereas no energetic exploits have been reported, the convenience of network-based assaults and the bypass of earlier safety mechanisms make immediate patching important. <\/p>\n<p>Organizations counting on Apache InLong ought to prioritize upgrading to model 2.2.0 or making use of the really useful patch to safeguard their knowledge pipelines and preserve compliance with greatest safety practices.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)\"><strong>Discover this Information Fascinating! Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cybersecurity-news\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, &amp;\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Immediate Updates!<\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A moderate-severity vulnerability, tracked as CVE-2025-27522, has been disclosed in Apache InLong, a preferred knowledge integration platform. The flaw, affecting variations 1.13.0 by means of 2.1.0, facilities on the deserialization of untrusted knowledge throughout JDBC (Java Database Connectivity) verification processing. This vulnerability is assessed as a secondary mining bypass for the beforehand reported CVE-2024-26579, indicating [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1995,157,2868,1062,2866,2867,2869,1061],"class_list":["post-2977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-apache","tag-data","tag-deserialization","tag-enables","tag-inlong","tag-jdbc","tag-untrusted","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2977"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2977\/revisions"}],"predecessor-version":[{"id":2978,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2977\/revisions\/2978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/2979"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 18:58:01 UTC -->