Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-44228

Опубликовано: 10 дек. 2021
Источник: ubuntu
Приоритет: high
EPSS Критический
CVSS2: 9.3
CVSS3: 10

Описание

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

РелизСтатусПримечание
bionic

released

2.10.0-2ubuntu0.1
devel

not-affected

2.15.0-1
esm-apps/bionic

released

2.10.0-2ubuntu0.1
esm-apps/focal

released

2.15.0-0.20.04.1
esm-apps/jammy

not-affected

2.15.0-1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

released

2.4-2ubuntu0.1~esm1
focal

released

2.15.0-0.20.04.1
hirsute

released

2.15.0-0.21.04.1
impish

released

2.15.0-0.21.10.1

Показывать по

EPSS

Процентиль: 100%
0.9447
Критический

9.3 Critical

CVSS2

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
больше 3 лет назад

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

CVSS3: 10
nvd
больше 3 лет назад

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

msrc
больше 3 лет назад

Apache Log4j Remote Code Execution Vulnerability

CVSS3: 10
debian
больше 3 лет назад

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2. ...

suse-cvrf
больше 3 лет назад

Security update for logback

EPSS

Процентиль: 100%
0.9447
Критический

9.3 Critical

CVSS2

10 Critical

CVSS3