Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-45105

Опубликовано: 18 дек. 2021
Источник: redhat
CVSS3: 5.9
EPSS Средний

Описание

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

A flaw was found in the Apache Log4j logging library 2.x. when the logging configuration uses a non-default Pattern Layout with a Context Lookup. Attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup and can cause Denial of Service.

Отчет

Red Hat Product Security has performed an analysis of this flaw and has classified the Attack Complexity(AC) as High because there are multiple factors involved which are beyond attacker's control:

Меры по смягчению последствий

For Log4j 2 versions up to and including 2.16.0, this flaw can be mitigated by:

  • In PatternLayout in the Log4j logging configuration, replace Context Lookups like ${ctx:loginId} or $${ctx:loginId} with Thread Context Map patterns (%X, %mdc, or %MDC) like %X{loginId}.
  • Otherwise, in the Log4j logging configuration, remove references to Context Lookups like ${ctx:loginId} or $${ctx:loginId} where they originate from sources external to the application such as HTTP headers or user input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2log4j-coreNot affected
Red Hat AMQ Broker 7log4j-coreNot affected
Red Hat build of Quarkuslog4j-coreNot affected
Red Hat CodeReady Studio 12log4j-coreAffected
Red Hat Decision Manager 7log4j-apiAffected
Red Hat Enterprise Linux 6log4jNot affected
Red Hat Enterprise Linux 7log4jNot affected
Red Hat Enterprise Linux 8parfait:0.5/log4j12Not affected
Red Hat JBoss Enterprise Application Platform 6log4jNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packlog4j-coreNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-674
https://bugzilla.redhat.com/show_bug.cgi?id=2034067log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern

EPSS

Процентиль: 98%
0.65452
Средний

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 3 лет назад

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

CVSS3: 5.9
nvd
больше 3 лет назад

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

CVSS3: 5.9
debian
больше 3 лет назад

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and ...

suse-cvrf
больше 3 лет назад

Security update for log4j

suse-cvrf
больше 3 лет назад

Security update for log4j

EPSS

Процентиль: 98%
0.65452
Средний

5.9 Medium

CVSS3