Categories: Cyber Security News

Apache InLong JDBC Vulnerabilities Enables Deserialization of Untrusted Data

Apache InLong, a comprehensive real-time data streaming platform, has been discovered to contain a moderate-severity security vulnerability affecting multiple versions of the software.

The newly identified CVE-2025-27522 represents a deserialization of untrusted data vulnerability that impacts Apache InLong versions 1.13.0 through 2.1.0, serving as a secondary mining bypass for a previously disclosed security flaw.

Security researchers yulate and m4x are credited with discovering this vulnerability, which has prompted the Apache Software Foundation to release immediate remediation guidance for affected users.

The security flaw, officially designated as CVE-2025-27522, affects a significant range of Apache InLong installations spanning from version 1.13.0 to 2.1.0.

This deserialization of untrusted data vulnerability allows potential attackers to exploit the way the software processes serialized data objects, potentially leading to remote code execution or other malicious activities.

The vulnerability has been classified with moderate severity, indicating that while the risk is significant, it may require specific conditions or elevated privileges to exploit successfully.

Apache InLong serves as a comprehensive data streaming platform designed for massive data ingestion, transformation, and distribution across enterprise environments.

The affected versions represent a substantial portion of recent releases, suggesting that many production environments could be vulnerable to this security flaw.

Organizations running Apache InLong in their data processing pipelines should immediately assess their current version deployments to determine exposure to this vulnerability.

Apache InLong Vulnerabilities

This newly discovered vulnerability represents a secondary mining bypass for CVE-2024-26579, indicating a sophisticated relationship between multiple security flaws within the Apache InLong codebase.

Secondary mining bypasses typically occur when security researchers discover alternative methods to exploit systems even after initial vulnerabilities have been patched, suggesting that the original fix for CVE-2024-26579 may have been incomplete or that related code paths remained vulnerable.

The connection between these two CVEs highlights the complex nature of deserialization vulnerabilities in modern software applications.

Deserialization attacks occur when applications process untrusted serialized data without proper validation, allowing attackers to manipulate the deserialization process to execute arbitrary code or compromise system integrity.

The fact that this represents a bypass of previous security measures underscores the importance of comprehensive security reviews and thorough testing of vulnerability fixes.

Mitigations

The Apache Software Foundation has provided clear remediation guidance for organizations affected by this vulnerability.

Users are strongly advised to upgrade to Apache InLong version 2.2.0, which contains the necessary security fixes to address both the current vulnerability and its relationship to the previous CVE-2024-26579.

For organizations unable to immediately upgrade to the latest version, the Apache team has provided a cherry-pick solution available through GitHub pull request #11732.

The cherry-pick approach allows administrators to apply the specific security fix to their current installations without requiring a full version upgrade, providing flexibility for environments with complex deployment requirements or extensive customizations.

However, upgrading to version 2.2.0 remains the recommended long-term solution, as it ensures comprehensive protection against both known vulnerabilities and includes additional security improvements implemented in the latest release.

Organizations should prioritize this security update based on their risk assessment and the criticality of their Apache InLong deployments within their data processing infrastructure.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

The post Apache InLong JDBC Vulnerabilities Enables Deserialization of Untrusted Data appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The Powerful Lenovo Legion RTX 5090 Gaming PC Drops Below $5,000 for the First Time in 2026

Lenovo's most powerful Legion gaming PC is back in stock, but not only that, it's…

12 minutes ago

Star Wars: Maul – Shadow Lord Season 1 Finale Review

Warning: This review contains full spoilers for Star Wars: Maul - Shadow Lord Episodes 9…

12 minutes ago

The 30 Best Pokemon of All Time

30 years. It feels like a lifetime (and for some of us it us, including…

13 minutes ago

Resident Evil Requiem Producer Sees DLSS 5 AI Backlash as ‘a Positive’ Because ‘It Meant We Got the Design Right’

Resident Evil Requiem producer Masato Kumazawa has said Capcom sees the drama surrounding the DLSS…

1 hour ago

Isa Briones Blasts ‘Disrespectful’ Fans for Yelling Pitt References During Her Broadway Show

The Pitt star Isa Briones has called out "f**king disrespectful" fans for yelling references while…

1 hour ago

Pinecone targets agentic completion rates

Pinecone has released Pinecone Nexus, a knowledge engine designed to move reasoning from retrieval to…

1 hour ago

This website uses cookies.