Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-45046

Опубликовано: 14 дек. 2021
Источник: ubuntu
Приоритет: high
EPSS Критический
CVSS2: 5.1
CVSS3: 9

Описание

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

2.16.0-1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

released

2.16.0-0.20.04.1
esm-apps/jammy

not-affected

2.16.0-1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

code not present
focal

released

2.16.0-0.20.04.1
hirsute

released

2.16.0-0.21.04.1
impish

released

2.16.0-0.21.10.1

Показывать по

EPSS

Процентиль: 100%
0.94434
Критический

5.1 Medium

CVSS2

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
больше 3 лет назад

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

CVSS3: 9
nvd
больше 3 лет назад

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

CVSS3: 9
debian
больше 3 лет назад

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2. ...

CVSS3: 9
github
больше 3 лет назад

Incomplete fix for Apache Log4j vulnerability

CVSS3: 9
fstec
больше 3 лет назад

Уязвимость компонента JNDI библиотеки журналирования Java-программ Apache Log4j2, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94434
Критический

5.1 Medium

CVSS2

9 Critical

CVSS3