Lucene search

K
redhatcveRedhat.comRH:CVE-2019-17571
HistoryApr 05, 2020 - 11:06 p.m.

CVE-2019-17571

2020-04-0523:06:12
redhat.com
access.redhat.com
34

0.874 High

EPSS

Percentile

98.7%

A flaw was discovered in Log4j, where a vulnerable SocketServer class may lead to the deserialization of untrusted data. This flaw allows an attacker to remotely execute arbitrary code when combined with a deserialization gadget.

Mitigation

Please note that the Log4j upstream strongly recommends against using the SerializedLayout with the SocketAppenders. Customers may mitigate this issue by removing the SocketServer class outright; or if they must continue to use SocketAppenders, they can modify their SocketAppender configuration from SerializedLayout to use JsonLayout instead. An example of this in log4j-server.properties might look like this:

log4j.appender.file.layout=org.apache.log4j.JsonLayout