Miggo Logo

CVE-2025-27522: Apache InLong: JDBC Vulnerability during verification processing

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.39964%
Published
5/28/2025
Updated
5/28/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.inlong:manager-pojomaven>= 1.13.0, < 2.2.02.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in the case-sensitive checking of sensitive parameters within JDBC URLs, specifically in the MySQLSensitiveUrlUtils.containSensitiveKey method. Parameters like autoDeserialize, allowLoadLocalInfile, and allowUrlInLocalInfile are intended to be disabled or handled carefully. The original code checked for these parameters using exact string matches (e.g., key + "=true"). An attacker could bypass this check by using mixed casing (e.g., autoDeserialize=TRue). This bypass would mean that the MySQLSensitiveUrlUtils.filterSensitive method, which relies on containSensitiveKey, would fail to remove or neutralize these dangerous parameters. Consequently, higher-level functions like MySQLSinkDTO.filterSensitive that use these utilities would operate on unsanitized JDBC URLs. If such a URL with a parameter like autoDeserialize=TRue (bypassing the filter) is used to establish a JDBC connection, it could lead to deserialization of untrusted data, as indicated by the CVE description (CWE-502). The patch addresses this by changing the checks in containSensitiveKey to be case-insensitive using StringUtils.containsIgnoreCase.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s*ri*liz*tion o* Untrust** **t* vuln*r**ility in *p**** InLon*. T*is issu* *****ts *p**** InLon*: *rom *.**.* t*rou** *.*.*. T*is vuln*r**ility is * s**on**ry minin* *yp*ss *or *V*-****-*****. Us*rs *r* **vis** to up*r*** to *p**** InLon*'s *.*.*

Reasoning

T** vuln*r**ility li*s in t** **s*-s*nsitiv* ****kin* o* s*nsitiv* p*r*m*t*rs wit*in J*** URLs, sp**i*i**lly in t** `MySQLS*nsitiv*UrlUtils.*ont*inS*nsitiv*K*y` m*t*o*. P*r*m*t*rs lik* `*uto**s*ri*liz*`, `*llowLo**Lo**lIn*il*`, *n* `*llowUrlInLo**lIn