Search for packages
| purl | pkg:maven/org.apache.logging.log4j/log4j@2.3.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-74dr-6hxt-tbgu
Aliases: CVE-2017-5645 GHSA-fxph-q3j8-mv87 |
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. |
Affected by 3 other vulnerabilities. |
|
VCID-mz9r-j78c-dfe3
Aliases: CVE-2020-9488 GHSA-vwqq-5vrc-xw9h |
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-jwav-88m7-6fhz | Remote code injection in Log4j Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. |
CVE-2021-44228
GHSA-jfh8-c2jp-5v3q |
| VCID-mz9r-j78c-dfe3 | Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. |
CVE-2020-9488
GHSA-vwqq-5vrc-xw9h |