logo

GHSA-xxfh-x98p-j8fr org.ops4j.pax.logging:pax-logging-log4j2

Package

Manager: maven
Name: org.ops4j.pax.logging:pax-logging-log4j2
Vulnerable Version: >=2.0.0 <2.0.11 || >=0 <1.11.10

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:H/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: N/A pctlN/A

Details

Remote code injection in Log4j (through pax-logging-log4j2) ### Impact Remote Code Execution. ### Patches Users of pax-logging 1.11.9 should update to 1.11.10. Users of pax-logging 2.0.10 should update to 2.0.11. ### Workarounds Set system property `-Dlog4j2.formatMsgNoLookups=true` ### References https://github.com/advisories/GHSA-jfh8-c2jp-5v3q

Metadata

Created: 2021-12-10T20:15:37Z
Modified: 2021-12-11T21:25:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-xxfh-x98p-j8fr/GHSA-xxfh-x98p-j8fr.json
CWE IDs: []
Alternative ID: N/A
Finding: F422
Auto approve: 1