Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-12798

Опубликовано: 19 дек. 2024
Источник: ubuntu
Приоритет: medium

Описание

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

РелизСтатусПримечание
devel

ignored

changes too intrusive
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

ignored

changes too intrusive
esm-apps/jammy

ignored

changes too intrusive
esm-apps/noble

ignored

changes too intrusive
esm-apps/xenial

ignored

changes too intrusive
focal

ignored

end of standard support, was needs-triage
jammy

ignored

changes too intrusive
noble

ignored

changes too intrusive
oracular

ignored

end of life, was ignored [changes too intrusive]

Показывать по

Связанные уязвимости

CVSS3: 5.5
redhat
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

nvd
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

debian
около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core ...

github
около 1 года назад

QOS.CH logback-core Expression Language Injection vulnerability

CVSS3: 7.3
fstec
около 1 года назад

Уязвимость модуля logback-core системы мониторинга QOS (Quality of Service), позволяющая нарушителю выполнить произвольный код

Уязвимость CVE-2024-12798