Логотип exploitDog
bind:CVE-2024-12798
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-12798

Количество 7

Количество 7

ubuntu логотип

CVE-2024-12798

около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

EPSS: Низкий
redhat логотип

CVE-2024-12798

около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-12798

около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

EPSS: Низкий
debian логотип

CVE-2024-12798

около 1 года назад

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core ...

EPSS: Низкий
github логотип

GHSA-pr98-23f8-jwxv

около 1 года назад

QOS.CH logback-core Expression Language Injection vulnerability

EPSS: Низкий
fstec логотип

BDU:2025-00177

около 1 года назад

Уязвимость модуля logback-core системы мониторинга QOS (Quality of Service), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0072-1

около 1 года назад

Security update for logback

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-12798

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-12798

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

CVSS3: 5.5
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-12798

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.

0%
Низкий
около 1 года назад
debian логотип
CVE-2024-12798

ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core ...

0%
Низкий
около 1 года назад
github логотип
GHSA-pr98-23f8-jwxv

QOS.CH logback-core Expression Language Injection vulnerability

0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-00177

Уязвимость модуля logback-core системы мониторинга QOS (Quality of Service), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.3
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0072-1

Security update for logback

около 1 года назад

Уязвимостей на страницу