CVE-2022-45588

7.8 HIGH
XXE

📋 TL;DR

This XXE vulnerability in Talend Remote Engine Gen 2 allows authenticated users with pipeline editing rights to potentially read sensitive files from the server. Only Talend Remote Engine Gen 2 versions before R2022-09 are affected, while Gen 1 and Cloud Engine for Design are not impacted.

💻 Affected Systems

Products:
  • Talend Remote Engine Gen 2
Versions: All versions before R2022-09
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Talend Remote Engine Gen 1 and Talend Cloud Engine for Design are NOT affected. Only users with pipeline editing rights can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could read sensitive system files, configuration files, or other data accessible to the Talend process, potentially leading to data exfiltration or further system compromise.

🟠

Likely Case

Limited file read access by authorized users who abuse their pipeline editing privileges to access files they shouldn't be able to read.

🟢

If Mitigated

No impact if proper access controls limit pipeline editing to trusted users only and the system is patched.

🌐 Internet-Facing: LOW - The vulnerability cannot be triggered remotely according to the description.
🏢 Internal Only: MEDIUM - Requires authenticated users with specific pipeline editing rights, limiting the attack surface to authorized insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with pipeline editing privileges. Cannot be exploited remotely according to vendor description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R2022-09 or later

Vendor Advisory: https://www.talend.com/security/incident-response/#CVE-2022-45588

Restart Required: Yes

Instructions:

1. Download R2022-09 or later release from Talend. 2. Stop the Talend Remote Engine Gen 2 service. 3. Replace with patched version. 4. Restart the service.

🔧 Temporary Workarounds

Restrict Pipeline Editing Access

all

Limit pipeline editing rights to only essential, trusted users to reduce attack surface.

Disable External Entity Processing

all

Configure XML parsers to disable external entity processing if possible in Talend configuration.

🧯 If You Can't Patch

  • Implement strict access controls to limit pipeline editing to minimal trusted personnel only.
  • Monitor for unusual file access patterns or XML parsing errors in Talend logs.

🔍 How to Verify

Check if Vulnerable:

Check Talend Remote Engine Gen 2 version. If version is earlier than R2022-09, it is vulnerable.

Check Version:

Check Talend administration console or configuration files for version information specific to your deployment.

Verify Fix Applied:

Verify version is R2022-09 or later after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • File access attempts through XML processing
  • Multiple failed pipeline edit attempts

Network Indicators:

  • Unusual outbound connections from Talend server during XML processing

SIEM Query:

Search for 'XXE', 'XML external entity', or 'file://' patterns in Talend application logs combined with pipeline edit events.

🔗 References

📤 Share & Export