GHSA-2qrg-x229-3v8q

Suggest an improvement
Source
https://github.com/advisories/GHSA-2qrg-x229-3v8q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/01/GHSA-2qrg-x229-3v8q/GHSA-2qrg-x229-3v8q.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2qrg-x229-3v8q
Aliases
Published
2020-01-06T18:43:49Z
Modified
2024-03-10T05:17:37.402005Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Deserialization of Untrusted Data in Log4j
Details

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions 1.2 up to 1.2.17.

Users are advised to migrate to org.apache.logging.log4j:log4j-core.

References

Affected packages

Maven / log4j:log4j

Package

Name
log4j:log4j
View open source insights on deps.dev
Purl
pkg:maven/log4j/log4j

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.2
Last affected
1.2.17

Affected versions

1.*

1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.2.11
1.2.12
1.2.13
1.2.14
1.2.15
1.2.16
1.2.17

Maven / org.zenframework.z8.dependencies.commons:log4j-1.2.17

Package

Name
org.zenframework.z8.dependencies.commons:log4j-1.2.17
View open source insights on deps.dev
Purl
pkg:maven/org.zenframework.z8.dependencies.commons/log4j-1.2.17

Affected ranges

Affected versions

2.*

2.0