Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1225

Опубликовано: 22 янв. 2026
Источник: redhat
CVSS3: 5
EPSS Низкий

Описание

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientslogback-coreFix deferred
Logging Subsystem for Red Hat OpenShiftlogback-coreFix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-dispatcher-rhel9Fix deferred
OpenShift Serverlessopenshift-serverless-1/kn-ekb-receiver-rhel9Fix deferred
Red Hat AMQ Broker 7logback-coreFix deferred
Red Hat build of Apache Camel for Spring Boot 4logback-coreFix deferred
Red Hat build of Apache Camel - HawtIO 4logback-coreFix deferred
Red Hat build of Debezium 2logback-coreFix deferred
Red Hat build of Debezium 3logback-coreFix deferred
Red Hat build of OptaPlanner 8logback-coreFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2431998ch.qos.logback/logback-core: Malicious logback.xml configuration file allows instantiation of arbitrary classes

EPSS

Процентиль: 1%
0.0001
Низкий

5 Medium

CVSS3

Связанные уязвимости

ubuntu
2 месяца назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

nvd
2 месяца назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

debian
2 месяца назад

ACE vulnerability in configuration file processing by QOS.CH logback- ...

suse-cvrf
около 2 месяцев назад

Security update for logback

github
2 месяца назад

Logback allows an attacker to instantiate classes already present on the class path

EPSS

Процентиль: 1%
0.0001
Низкий

5 Medium

CVSS3