In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
{ "binaries": [ { "binary_version": "1:1.1.3-2ubuntu0.1~esm1", "binary_name": "liblogback-java" }, { "binary_version": "1:1.1.3-2ubuntu0.1~esm1", "binary_name": "liblogback-java-doc" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_version": "1:1.2.3-2ubuntu1~18.04.1+esm1", "binary_name": "liblogback-java" }, { "binary_version": "1:1.2.3-2ubuntu1~18.04.1+esm1", "binary_name": "liblogback-java-doc" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }
{ "binaries": [ { "binary_version": "1:1.2.3-5ubuntu0.1~esm1", "binary_name": "liblogback-java" }, { "binary_version": "1:1.2.3-5ubuntu0.1~esm1", "binary_name": "liblogback-java-doc" } ], "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro" }