Lucene search

K
githubGitHub Advisory DatabaseGHSA-VMQ6-5M68-F53M
HistoryNov 29, 2023 - 12:30 p.m.

logback serialization vulnerability

2023-11-2912:30:16
CWE-502
GitHub Advisory Database
github.com
84
logback
serialization
vulnerability
dos
attack

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.1%

A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.

This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html

Affected configurations

Vulners
Node
ch.qos.logback\logbackMatchclassic
OR
ch.qos.logback\logbackMatchcore
OR
ch.qos.logback\logbackMatchcore
OR
ch.qos.logback\logbackMatchclassic
OR
ch.qos.logback\logbackMatchcore
OR
ch.qos.logback\logbackMatchclassic

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.1%