Search CVE reports
1 – 6 of 6 results
** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap...
1 affected package
apache-log4j1.2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache-log4j1.2 | Not affected | Not affected | Ignored | Ignored |
Some fixes available 4 of 7
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
1 affected package
apache-log4j1.2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 4 of 7
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This...
1 affected package
apache-log4j1.2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 4 of 7
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to....
1 affected package
apache-log4j1.2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 6 of 8
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and...
1 affected package
apache-log4j1.2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 2 of 5
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to...
1 affected package
apache-log4j1.2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache-log4j1.2 | Not affected | Not affected | Not affected | Fixed |