Search CVE reports
1 – 10 of 10 results
Apache Log4j's JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point...
2 affected packages
apache-log4j1.2, apache-log4j2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| apache-log4j2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification...
2 affected packages
apache-log4j1.2, apache-log4j2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| apache-log4j2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such...
2 affected packages
apache-log4j1.2, apache-log4j2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| apache-log4j2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout , in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of...
2 affected packages
apache-log4j1.2, apache-log4j2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| apache-log4j2 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap...
1 affected package
apache-log4j1.2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Not affected | Not affected | Ignored | Ignored |
Some fixes available 4 of 7
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
1 affected package
apache-log4j1.2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 4 of 7
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This...
1 affected package
apache-log4j1.2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 4 of 7
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to....
1 affected package
apache-log4j1.2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 6 of 8
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and...
1 affected package
apache-log4j1.2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 2 of 5
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to...
1 affected package
apache-log4j1.2
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| apache-log4j1.2 | Not affected | Not affected | Not affected | Fixed |