Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-12801

Опубликовано: 19 дек. 2024
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12  on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in  XML configuration files.

A Server-Side Request Forgery (SSRF) vulnerability was found in Logback. This flaw allows a local attacker to forge requests by modifying XML configuration files to ignore external DTD files specified in DOCTYPE declarations, potentially exposing confidential or restricted data.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientsch.qos.logback/logback-coreFix deferred
A-MQ Clients 2ch.qos.logback/logback-coreFix deferred
Logging Subsystem for Red Hat OpenShiftch.qos.logback/logback-coreFix deferred
Red Hat AMQ Broker 7ch.qos.logback/logback-coreFix deferred
Red Hat build of Apache Camel for Spring Boot 4ch.qos.logback/logback-coreFix deferred
Red Hat build of Apache Camel - HawtIO 4ch.qos.logback/logback-coreFix deferred
Red Hat build of Debezium 2ch.qos.logback/logback-coreFix deferred
Red Hat Build of Keycloakch.qos.logback/logback-coreFix deferred
Red Hat build of OptaPlanner 8ch.qos.logback/logback-coreFix deferred
Red Hat Data Grid 8ch.qos.logback/logback-coreFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2333370logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks

EPSS

Процентиль: 15%
0.00048
Низкий

3.3 Low

CVSS3

Связанные уязвимости

ubuntu
около 1 года назад

Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12  on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in  XML configuration files.

nvd
около 1 года назад

Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12  on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in  XML configuration files.

debian
около 1 года назад

Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logba ...

github
около 1 года назад

QOS.CH logback-core Server-Side Request Forgery vulnerability

suse-cvrf
около 1 года назад

Security update for logback

EPSS

Процентиль: 15%
0.00048
Низкий

3.3 Low

CVSS3