Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-12798

Опубликовано: 19 дек. 2024
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

A flaw was found in Logback. This flaw allows a privileged attacker with write access to modify Logback configuration files or inject a malicious environment variable to execute arbitrary code via the JaninoEventEvaluator extension.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientsch.qos.logback/logback-coreFix deferred
A-MQ Clients 2ch.qos.logback/logback-coreAffected
Logging Subsystem for Red Hat OpenShiftch.qos.logback/logback-coreAffected
Red Hat AMQ Broker 7ch.qos.logback/logback-coreAffected
Red Hat build of Apache Camel - HawtIO 4ch.qos.logback/logback-coreFix deferred
Red Hat build of Debezium 2ch.qos.logback/logback-coreWill not fix
Red Hat Build of Keycloakch.qos.logback/logback-coreNot affected
Red Hat build of OptaPlanner 8ch.qos.logback/logback-coreFix deferred
Red Hat Data Grid 8ch.qos.logback/logback-coreWill not fix
Red Hat Fuse 7ch.qos.logback/logback-coreOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-917
https://bugzilla.redhat.com/show_bug.cgi?id=2333351logback-core: arbitrary code execution via JaninoEventEvaluator

EPSS

Процентиль: 25%
0.00089
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

ubuntu
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

nvd
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

debian
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core ...

github
около 1 года назад

QOS.CH logback-core Expression Language Injection vulnerability

CVSS3: 7.3
fstec
около 1 года назад

Уязвимость модуля logback-core системы мониторинга QOS (Quality of Service), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 25%
0.00089
Низкий

5.5 Medium

CVSS3