logo

CVE-2017-5645 org.apache.logging.log4j:log4j-core

Package

Manager: maven
Name: org.apache.logging.log4j:log4j-core
Vulnerable Version: >=2.0 <2.8.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.94013 pctl0.99887

Details

Deserialization of Untrusted Data in Log4j In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Metadata

Created: 2020-01-06T18:43:38Z
Modified: 2022-04-01T20:26:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/01/GHSA-fxph-q3j8-mv87/GHSA-fxph-q3j8-mv87.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-fxph-q3j8-mv87
Finding: F096
Auto approve: 1