Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fxph-q3j8-mv87

Опубликовано: 06 янв. 2020
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Deserialization of Untrusted Data in Log4j

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Ссылки

Пакеты

Наименование

org.apache.logging.log4j:log4j

maven
Затронутые версииВерсия исправления

>= 2.0, < 2.8.2

2.8.2

Наименование

org.apache.logging.log4j:log4j-core

maven
Затронутые версииВерсия исправления

>= 2.0, < 2.8.2

2.8.2

EPSS

Процентиль: 100%
0.94013
Критический

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 8.1
redhat
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 9.8
nvd
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 9.8
debian
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or ...

oracle-oval
почти 8 лет назад

ELSA-2017-2423: log4j security update (IMPORTANT)

EPSS

Процентиль: 100%
0.94013
Критический

9.8 Critical

CVSS3

Дефекты

CWE-502