GHSA-fp5r-v3w9-4333

Suggest an improvement
Source
https://github.com/advisories/GHSA-fp5r-v3w9-4333
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-fp5r-v3w9-4333/GHSA-fp5r-v3w9-4333.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fp5r-v3w9-4333
Aliases
Published
2021-12-14T19:49:31Z
Modified
2024-02-14T05:33:13.343782Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data
Details

JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

References

Affected packages

Maven / log4j:log4j

Package

Name
log4j:log4j
View open source insights on deps.dev
Purl
pkg:maven/log4j/log4j

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.2.0
Last affected
1.2.17

Affected versions

1.*

1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.2.11
1.2.12
1.2.13
1.2.14
1.2.15
1.2.16
1.2.17

Maven / org.zenframework.z8.dependencies.commons:log4j-1.2.17

Package

Name
org.zenframework.z8.dependencies.commons:log4j-1.2.17
View open source insights on deps.dev
Purl
pkg:maven/org.zenframework.z8.dependencies.commons/log4j-1.2.17

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.0

Affected versions

2.*

2.0