Количество 17
Количество 17

CVE-2022-23305
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

CVE-2022-23305
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

CVE-2022-23305
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
CVE-2022-23305
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as ...
GHSA-65fg-84f6-3jq3
SQL Injection in Log4j 1.2.x

BDU:2023-07205
Уязвимость адаптера JDBCAppender программы для журналирования Java-программ Log4j, позволяющая нарушителю выполнять произвольные SQL-запросы к базе данных

openSUSE-SU-2022:0226-1
Security update for log4j12

openSUSE-SU-2022:0214-1
Security update for log4j

SUSE-SU-2022:14881-1
Security update for log4j

SUSE-SU-2022:0226-1
Security update for log4j12

SUSE-SU-2022:0214-1
Security update for log4j

SUSE-SU-2022:0212-1
Security update for log4j
ELSA-2022-0442
ELSA-2022-0442: log4j security update (IMPORTANT)

openSUSE-SU-2022:0038-1
Security update for kafka

RLSA-2022:0290
Important: parfait:0.5 security update
ELSA-2022-9419
ELSA-2022-9419: log4j security update (IMPORTANT)
ELSA-2022-0290
ELSA-2022-0290: parfait:0.5 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-23305 By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | CVSS3: 9.8 | 15% Средний | больше 3 лет назад |
![]() | CVE-2022-23305 By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | CVSS3: 8.8 | 15% Средний | больше 3 лет назад |
![]() | CVE-2022-23305 By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | CVSS3: 9.8 | 15% Средний | больше 3 лет назад |
CVE-2022-23305 By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as ... | CVSS3: 9.8 | 15% Средний | больше 3 лет назад | |
GHSA-65fg-84f6-3jq3 SQL Injection in Log4j 1.2.x | CVSS3: 9.8 | 15% Средний | больше 3 лет назад | |
![]() | BDU:2023-07205 Уязвимость адаптера JDBCAppender программы для журналирования Java-программ Log4j, позволяющая нарушителю выполнять произвольные SQL-запросы к базе данных | CVSS3: 9.8 | 15% Средний | больше 3 лет назад |
![]() | openSUSE-SU-2022:0226-1 Security update for log4j12 | больше 3 лет назад | ||
![]() | openSUSE-SU-2022:0214-1 Security update for log4j | больше 3 лет назад | ||
![]() | SUSE-SU-2022:14881-1 Security update for log4j | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0226-1 Security update for log4j12 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0214-1 Security update for log4j | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0212-1 Security update for log4j | больше 3 лет назад | ||
ELSA-2022-0442 ELSA-2022-0442: log4j security update (IMPORTANT) | больше 3 лет назад | |||
![]() | openSUSE-SU-2022:0038-1 Security update for kafka | больше 3 лет назад | ||
![]() | RLSA-2022:0290 Important: parfait:0.5 security update | больше 3 лет назад | ||
ELSA-2022-9419 ELSA-2022-9419: log4j security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-0290 ELSA-2022-0290: parfait:0.5 security update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу