Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7z5b-4xfw-27ar
Summary
QOS.CH logback-core Server-Side Request Forgery vulnerability
Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 1.5.12 on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML.
 
The attacks involves the modification of DOCTYPE declaration inĀ  XML configuration files.
Aliases
0
alias CVE-2024-12801
1
alias GHSA-6v67-2wr5-gvf4
Fixed_packages
0
url pkg:maven/ch.qos.logback/logback-core@1.3.15
purl pkg:maven/ch.qos.logback/logback-core@1.3.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pnxr-hj9y-yfd9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/ch.qos.logback/logback-core@1.3.15
1
url pkg:maven/ch.qos.logback/logback-core@1.5.13
purl pkg:maven/ch.qos.logback/logback-core@1.5.13
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pnxr-hj9y-yfd9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/ch.qos.logback/logback-core@1.5.13
Affected_packages
0
url pkg:maven/ch.qos.logback/logback-core@1.4.0
purl pkg:maven/ch.qos.logback/logback-core@1.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-24ma-xwcb-uud9
1
vulnerability VCID-7z5b-4xfw-27ar
2
vulnerability VCID-jrv7-8e72-pyhb
3
vulnerability VCID-kfd6-e5jj-fkht
4
vulnerability VCID-pnxr-hj9y-yfd9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/ch.qos.logback/logback-core@1.4.0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12801.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12801
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.13881
published_at 2026-04-16T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14001
published_at 2026-04-07T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.13986
published_at 2026-04-13T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14038
published_at 2026-04-12T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14079
published_at 2026-04-11T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14135
published_at 2026-04-09T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14129
published_at 2026-04-02T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14185
published_at 2026-04-04T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14083
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12801
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12801
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/qos-ch/logback
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback
5
reference_url https://github.com/qos-ch/logback/commit/5f05041cba4c4ac0a62748c5c527a2da48999f2d
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/5f05041cba4c4ac0a62748c5c527a2da48999f2d
6
reference_url https://logback.qos.ch/news.html#1.3.15
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-20T20:15:51Z/
url https://logback.qos.ch/news.html#1.3.15
7
reference_url https://logback.qos.ch/news.html#1.5.13
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-20T20:15:51Z/
url https://logback.qos.ch/news.html#1.5.13
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-12801
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-12801
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091320
reference_id 1091320
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091320
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333370
reference_id 2333370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333370
11
reference_url https://github.com/advisories/GHSA-6v67-2wr5-gvf4
reference_id GHSA-6v67-2wr5-gvf4
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6v67-2wr5-gvf4
Weaknesses
0
cwe_id 918
name Server-Side Request Forgery (SSRF)
description The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score0.1 - 5.0
Exploitability0.5
Weighted_severity3.0
Risk_score1.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7z5b-4xfw-27ar