Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-11226

Опубликовано: 01 окт. 2025
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

ACE vulnerability in conditional configuration file processing by QOS.CH logback-core up to and including version 1.5.18 in Java applications, allows an attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. A successful attack requires the presence of Janino library and Spring Framework to be present on the user's class path. In addition, the attacker must  have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

An arbitrary code execution vector has been discovered in the maven logback-core package. This vulnerability allows an attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. A successful attack requires the presence of the Janino library and Spring Framework to be present on the user's class path. In addition, the attacker must either have write access to a configuration file or the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientslogback-coreFix deferred
Logging Subsystem for Red Hat OpenShiftlogback-coreFix deferred
Migration Toolkit for Applications 8logback-coreFix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-dispatcher-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-kafka-controller-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-post-install-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-receiver-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-webhook-kafka-rhel8Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-eventing-istio-controller-rhel8Fix deferred
Red Hat AMQ Broker 7logback-coreFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2400602ch.qos.logback/logback-core: Conditional abitrary code execution in logback-core

EPSS

Процентиль: 18%
0.00058
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

nvd
6 месяцев назад

ACE vulnerability in conditional configuration file processing by QOS.CH logback-core up to and including version 1.5.18 in Java applications, allows an attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. A successful attack requires the presence of Janino library and Spring Framework to be present on the user's class path. In addition, the attacker must  have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

debian
6 месяцев назад

ACE vulnerability in conditional configuration file processing by QOS ...

suse-cvrf
6 месяцев назад

Security update for logback

github
6 месяцев назад

QOS.CH logback-core is vulnerable to Arbitrary Code Execution through file processing

EPSS

Процентиль: 18%
0.00058
Низкий

6.4 Medium

CVSS3