CVE-2021-44832
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
28/12/2021
Last modified:
07/11/2023
Description
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
Impact
Base Score 3.x
6.60
Severity 3.x
MEDIUM
Base Score 2.0
8.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* | 2.0.1 (including) | 2.3.2 (excluding) |
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* | 2.4 (including) | 2.12.4 (excluding) |
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* | 2.13.0 (including) | 2.17.1 (excluding) |
cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:apache:log4j:2.0:beta7:*:*:*:*:*:* | ||
cpe:2.3:a:apache:log4j:2.0:beta8:*:*:*:*:*:* | ||
cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:* | ||
cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* | 8.0.0.0 (including) | 8.5.1.0 (including) |
cpe:2.3:a:oracle:communications_interactive_session_recorder:6.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* | 17.12.0 (including) | 17.12.11 (including) |
cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* | 18.8.0 (including) | 18.8.13 (including) |
cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:* | 19.12.0 (including) | 19.12.12 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2021/12/28/1
- https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf
- https://issues.apache.org/jira/browse/LOG4J2-3293
- https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143
- https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/
- https://security.netapp.com/advisory/ntap-20220104-0001/
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html