CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
85.5%
Issue Overview:
A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSSink in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if JMSSink is deployed and has been configured to perform JNDI requests. (CVE-2022-23302)
A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens. (CVE-2022-23305)
A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run. (CVE-2022-23307)
Affected Packages:
log4j
Issue Correction:
Run yum update log4j to update your system.
New Packages:
noarch:
log4j-1.2.17-16.14.amzn1.noarch
log4j-javadoc-1.2.17-16.14.amzn1.noarch
log4j-manual-1.2.17-16.14.amzn1.noarch
src:
log4j-1.2.17-16.14.amzn1.src
Red Hat: CVE-2022-23302, CVE-2022-23305, CVE-2022-23307
Mitre: CVE-2022-23302, CVE-2022-23305, CVE-2022-23307
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | noarch | log4j | < 1.2.17-16.14.amzn1 | log4j-1.2.17-16.14.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | log4j-javadoc | < 1.2.17-16.14.amzn1 | log4j-javadoc-1.2.17-16.14.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | log4j-manual | < 1.2.17-16.14.amzn1 | log4j-manual-1.2.17-16.14.amzn1.noarch.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
85.5%