CVE-2023-31065

9.1 CRITICAL

📋 TL;DR

This CVE describes an Insufficient Session Expiration vulnerability in Apache InLong where old sessions remain valid even after user deletion or password changes. Attackers can hijack these sessions to gain unauthorized access. Affects Apache InLong versions 1.4.0 through 1.6.0.

💻 Affected Systems

Products:
  • Apache InLong
Versions: 1.4.0 through 1.6.0
Operating Systems: All platforms running Apache InLong
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent administrative access to InLong clusters, enabling data exfiltration, system manipulation, or complete compromise of data ingestion pipelines.

🟠

Likely Case

Unauthorized access to InLong management interfaces leading to data pipeline manipulation, configuration changes, or data access.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but session hijacking remains possible for authenticated users.

🌐 Internet-Facing: HIGH - Internet-facing InLong instances allow remote attackers to exploit session hijacking without network access barriers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts can exploit this, but requires initial access to the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining a valid session token, but once obtained, the attack is straightforward. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.0

Vendor Advisory: https://lists.apache.org/thread/to7o0n2cks0omtwo6mhh5cs2vfdbplqf

Restart Required: Yes

Instructions:

1. Upgrade Apache InLong to version 1.7.0 or later. 2. Alternatively, apply patches from GitHub PRs #7836 and #7884 to existing installations. 3. Restart all InLong services after patching.

🔧 Temporary Workarounds

Session Timeout Reduction

all

Reduce session timeout values to minimize window for session hijacking

Modify session.timeout configuration in InLong properties files

Network Segmentation

all

Restrict access to InLong management interfaces to trusted networks only

Configure firewall rules to limit access to InLong ports (default 8080, 8081)

🧯 If You Can't Patch

  • Implement strict network access controls to limit InLong interface exposure
  • Deploy session monitoring and alerting for unusual session activity

🔍 How to Verify

Check if Vulnerable:

Check InLong version via web interface or configuration files. Versions 1.4.0-1.6.0 are vulnerable.

Check Version:

Check InLong web interface or examine version in configuration files

Verify Fix Applied:

Verify version is 1.7.0 or later, or confirm patches from PRs #7836 and #7884 are applied.

📡 Detection & Monitoring

Log Indicators:

  • Multiple sessions from same user with different IPs
  • Session activity after user deletion/password change
  • Unusual access patterns to management interfaces

Network Indicators:

  • Unexpected connections to InLong management ports
  • Session tokens being reused across different source IPs

SIEM Query:

source="inlong" AND (event="session_created" OR event="user_auth") | stats count by user, src_ip | where count > 1

🔗 References

📤 Share & Export