Advisory

Apache InLong project reports critical flaw in its TubeMQ component

Take action: If you are using Apache InLong, first check whether the TubeMQ is exposed to the internet or not. If it's exposed, patch ASAP. If not, plan for a patch by cherry-picking the patch code or just upgrade to the latest version of Apache InLong. Unfortunately, upgrading may be a tedious process, so patching may be a first choice.


Learn More

The Apache InLong project, a data integration framework designed for managing large-scale data streams, has issued an urgent security advisory regarding a critical vulnerability in its TubeMQ component.

The flaw, tracked as CVE-2024-36268 (CVSS score 9.8), allows remote attackers to execute arbitrary code on affected systems. The vulnerability is located in the TubeMQ Client, a part of the InLong framework that enables communication with the TubeMQ message queue system. This component is used to ensure the smooth and secure transmission of data within the framework .The identified flaw permits code injection, which could be exploited by malicious actors to gain unauthorized control over the system. This could lead to severe breaches of data integrity and confidentiality, impacting the sensitive information processed through InLong.

The InLong team has released version 1.13.0 of the framework, which addresses the identified security flaw. Users of Apache InLong are strongly urged to upgrade to this latest version without delay to protect their systems from potential exploitation.

For users who are unable to immediately perform the upgrade, the InLong project has also provided a patch that can be applied directly to the source code.

Apache InLong project reports critical flaw in its TubeMQ component