Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-8088

Опубликовано: 22 фев. 2018
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.

An XML deserialization vulnerability was discovered in slf4j's EventData, which accepts an XML serialized string and can lead to arbitrary code execution.

Отчет

Subscription Asset Manager is now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. This issue did not affect the versions of Candlepin as shipped with Red Hat Satellite 6 as Candlepin uses slf4j-api and not the affected slf4j-ext (which is not on the Candlepin classpath). Red Hat Enterprise Virtualization Manager 4.1 is affected by this issue. Updated packages that address this issue are available through the Red Hat Enterprise Linux Server channels. Virtualization Manager hosts should be subscribed to these channels and obtain the updates via yum update.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
JBoss Developer Studio 11slf4jWill not fix
Red Hat Enterprise Linux 6slf4jWill not fix
Red Hat Enterprise Linux 8slf4jNot affected
Red Hat Fuse 7slf4jAffected
Red Hat Fuse 7teiidAffected
Red Hat JBoss A-MQ 6slf4jUnder investigation
Red Hat JBoss BRMS 5slf4jNot affected
Red Hat JBoss Data Grid 6slf4jNot affected
Red Hat JBoss Data Grid 7slf4jAffected
Red Hat JBoss Enterprise Application Platform 5slf4jOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1548909slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution

EPSS

Процентиль: 74%
0.00836
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.

CVSS3: 9.8
nvd
больше 7 лет назад

org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.

CVSS3: 9.8
debian
больше 7 лет назад

org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before ...

suse-cvrf
больше 7 лет назад

Security update for slf4j

suse-cvrf
больше 7 лет назад

Security update for slf4j

EPSS

Процентиль: 74%
0.00836
Низкий

8.1 High

CVSS3