Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jrv7-8e72-pyhb
Summary
QOS.CH logback-core Expression Language Injection vulnerability
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core up to and including version 1.5.12 in Java applications allows attackers to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution.

Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension.

A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
Aliases
0
alias CVE-2024-12798
1
alias GHSA-pr98-23f8-jwxv
Fixed_packages
0
url pkg:maven/ch.qos.logback/logback-core@1.3.15
purl pkg:maven/ch.qos.logback/logback-core@1.3.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pnxr-hj9y-yfd9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/ch.qos.logback/logback-core@1.3.15
1
url pkg:maven/ch.qos.logback/logback-core@1.5.13
purl pkg:maven/ch.qos.logback/logback-core@1.5.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pnxr-hj9y-yfd9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/ch.qos.logback/logback-core@1.5.13
Affected_packages
0
url pkg:maven/ch.qos.logback/logback-core@1.4.0
purl pkg:maven/ch.qos.logback/logback-core@1.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24ma-xwcb-uud9
1
vulnerability VCID-7z5b-4xfw-27ar
2
vulnerability VCID-jrv7-8e72-pyhb
3
vulnerability VCID-kfd6-e5jj-fkht
4
vulnerability VCID-pnxr-hj9y-yfd9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/ch.qos.logback/logback-core@1.4.0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12798.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12798
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25247
published_at 2026-04-07T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25276
published_at 2026-04-13T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25329
published_at 2026-04-12T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25371
published_at 2026-04-11T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.2536
published_at 2026-04-09T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25438
published_at 2026-04-02T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25474
published_at 2026-04-04T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25315
published_at 2026-04-08T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31106
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12798
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/qos-ch/logback
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback
5
reference_url https://github.com/qos-ch/logback/commit/2cb6d520df7592ef1c3a198f1b5df3c10c93e183
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/2cb6d520df7592ef1c3a198f1b5df3c10c93e183
6
reference_url https://logback.qos.ch/news.html#1.3.15
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-20T20:17:18Z/
url https://logback.qos.ch/news.html#1.3.15
7
reference_url https://logback.qos.ch/news.html#1.5.13
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-20T20:17:18Z/
url https://logback.qos.ch/news.html#1.5.13
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-12798
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-12798
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091319
reference_id 1091319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091319
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333351
reference_id 2333351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333351
11
reference_url https://github.com/advisories/GHSA-pr98-23f8-jwxv
reference_id GHSA-pr98-23f8-jwxv
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pr98-23f8-jwxv
12
reference_url https://access.redhat.com/errata/RHSA-2025:1078
reference_id RHSA-2025:1078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1078
Weaknesses
0
cwe_id 917
name Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
description The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score4.0 - 7.2
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jrv7-8e72-pyhb