Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2017-5645: [LOG4J2-1863] Add support for filtering input in TcpSocketServer and UdpSocketServer

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVE
#vulnerability#mac#apache#java
  • **Type: ** New Feature

  • Status: Closed

  • **Priority: ** Major

  • Resolution: Fixed

  • Affects Version/s: 2.8.1

It is best practice to add a configurable class filter to ObjectInputStream usage when input comes from untrusted sources. Add this feature to TcpSocketServer and UdpSocketServer along with sensible default settings. This feature is unnecessary in JmsServer as that relies on the underlying configuration of the JMS server (e.g., ActiveMQ has a similar configuration option).

Security Details

CVE-2017-5645: Apache Log4j socket receiver deserialization vulnerability

Severity: High

CVSS Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Vendor: The Apache Software Foundation

Versions Affected: all versions from 2.0-alpha1 to 2.8.1

Description: When using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Mitigation: Java 7+ users should migrate to version 2.8.2 or avoid using the socket server classes. Java 6 users should avoid using the TCP or UDP socket server classes, or they can manually backport the security fix from 2.8.2: <https: Credit: This issue was discovered by Marcio Almeida de Macedo of Red Team at Telstra

relates to

Task - A task that needs to be done. LOG4J2-1958 Deprecate SerializedLayout and remove it as default

  • Major - Major loss of function.
  • Closed

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907