Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <5814f3ea-59ae-7533-1ea5-6e7203561a5e@apache.org>
Date: Tue, 28 Dec 2021 19:26:40 +0000
From: Matt Sicker <mattsicker@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2021-44832: Apache Log4j2 vulnerable to RCE via JDBC Appender
 when attacker controls configuration 

Severity: moderate

Description:

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

This issue is being tracked as LOG4J2-3293,

References:

https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143
https://issues.apache.org/jira/browse/LOG4J2-3293

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.