Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qqpg-mvqg-649v

Опубликовано: 22 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 1.8

Описание

Logback allows an attacker to instantiate classes already present on the class path

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file.

The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

Пакеты

Наименование

ch.qos.logback:logback-core

maven
Затронутые версииВерсия исправления

< 1.5.25

1.5.25

EPSS

Процентиль: 1%
0.00011
Низкий

1.8 Low

CVSS4

Дефекты

CWE-20

Связанные уязвимости

ubuntu
16 дней назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

nvd
16 дней назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

debian
16 дней назад

ACE vulnerability in configuration file processing by QOS.CH logback- ...

suse-cvrf
5 дней назад

Security update for logback

EPSS

Процентиль: 1%
0.00011
Низкий

1.8 Low

CVSS4

Дефекты

CWE-20