In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
{
"cwe_ids": [
"CWE-502"
],
"github_reviewed_at": "2021-12-17T19:25:11Z",
"severity": "MODERATE",
"nvd_published_at": "2021-12-16T19:15:00Z",
"github_reviewed": true
}