CVE-2023-43668

9.8 CRITICAL

📋 TL;DR

CVE-2023-43668 is an authorization bypass vulnerability in Apache InLong that allows attackers to manipulate user-controlled parameters to bypass security checks for sensitive settings like autoDeserialize and allowLoadLocalInfile. This affects Apache InLong versions 1.4.0 through 1.8.0. Organizations using vulnerable versions of Apache InLong for data integration are at risk.

💻 Affected Systems

Products:
  • Apache InLong
Versions: 1.4.0 through 1.8.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass critical security controls, potentially enabling remote code execution, data exfiltration, or complete system compromise by manipulating sensitive configuration parameters.

🟠

Likely Case

Attackers with access to the application could bypass authorization checks to modify sensitive settings, potentially leading to data exposure or privilege escalation.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the InLong application scope rather than broader infrastructure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the application interface but the vulnerability itself is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.0

Vendor Advisory: https://lists.apache.org/thread/16gtk7rpdm1rof075ro83fkrnhbzn5sh

Restart Required: Yes

Instructions:

1. Upgrade Apache InLong to version 1.9.0 or later. 2. Alternatively, apply the specific patch from GitHub PR #8604. 3. Restart all InLong services after patching.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Apache InLong instances to only trusted sources

Access Control Hardening

all

Implement strict authentication and authorization controls around InLong administrative interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Apache InLong instances from critical systems
  • Deploy web application firewall (WAF) rules to detect and block parameter manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check Apache InLong version using the application's admin interface or by examining deployment configuration files for version information.

Check Version:

Check the InLong web interface or examine the pom.xml file for version information

Verify Fix Applied:

Verify the version is 1.9.0 or later, or confirm that the specific patch from PR #8604 has been applied to the codebase.

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter modifications in request logs
  • Multiple failed authorization attempts followed by successful sensitive parameter changes
  • Administrative actions from unexpected user accounts or IP addresses

Network Indicators:

  • Unusual traffic patterns to InLong administrative endpoints
  • Requests containing sensitive parameter names like autoDeserialize or allowLoadLocalInfile

SIEM Query:

source="inlong" AND (param="autoDeserialize" OR param="allowLoadLocalInfile") AND action="modify"

🔗 References

📤 Share & Export