Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pr98-23f8-jwxv

Опубликовано: 19 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 5.9

Описание

QOS.CH logback-core Expression Language Injection vulnerability

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core up to and including version 1.5.12 in Java applications allows attackers to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution.

Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension.

A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

Пакеты

Наименование

ch.qos.logback:logback-core

maven
Затронутые версииВерсия исправления

>= 1.4.0, < 1.5.13

1.5.13

Наименование

ch.qos.logback:logback-core

maven
Затронутые версииВерсия исправления

< 1.3.15

1.3.15

EPSS

Процентиль: 52%
0.0029
Низкий

5.9 Medium

CVSS4

Дефекты

CWE-917

Связанные уязвимости

ubuntu
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

CVSS3: 5.5
redhat
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

nvd
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

debian
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core ...

CVSS3: 7.3
fstec
около 1 года назад

Уязвимость модуля logback-core системы мониторинга QOS (Quality of Service), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 52%
0.0029
Низкий

5.9 Medium

CVSS4

Дефекты

CWE-917