CVE-2023-6378 – ch.qos.logback:logback-core
Package
Manager: maven
Name: ch.qos.logback:logback-core
Vulnerable Version: >=1.3.0 <1.3.12 || >=1.4.0 <1.4.12 || >=0 <1.2.13
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
EPSS: 0.00652 pctl0.6999
Details
logback serialization vulnerability A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html
Metadata
Created: 2023-11-29T12:30:16Z
Modified: 2024-11-29T12:31:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-vmq6-5m68-f53m/GHSA-vmq6-5m68-f53m.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-vmq6-5m68-f53m
Finding: F096
Auto approve: 1