Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2qrg-x229-3v8q

Опубликовано: 06 янв. 2020
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Deserialization of Untrusted Data in Log4j

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions 1.2 up to 1.2.17.

Users are advised to migrate to org.apache.logging.log4j:log4j-core.

Ссылки

Пакеты

Наименование

log4j:log4j

maven
Затронутые версииВерсия исправления

>= 1.2, <= 1.2.17

Отсутствует

Наименование

org.zenframework.z8.dependencies.commons:log4j-1.2.17

maven
Затронутые версииВерсия исправления

= 2.0

Отсутствует

EPSS

Процентиль: 98%
0.53459
Средний

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
redhat
больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
nvd
больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
debian
больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to de ...

suse-cvrf
больше 5 лет назад

Security update for log4j

EPSS

Процентиль: 98%
0.53459
Средний

9.8 Critical

CVSS3

Дефекты

CWE-502