9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.9%
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a
configuration parameter where the values to be inserted are converters from
PatternLayout. The message converter, %m, is likely to always be included.
This allows attackers to manipulate the SQL by entering crafted strings
into input fields or headers of an application that are logged allowing
unintended SQL queries to be executed. Note this issue only affects Log4j
1.x when specifically configured to use the JDBCAppender, which is not the
default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced
with proper support for parameterized SQL queries and further customization
over the columns written to in logs. Apache Log4j 1.2 reached end of life
in August 2015. Users should upgrade to Log4j 2 as it addresses numerous
other issues from the previous versions.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | apache-log4j1.2 | <Β 1.2.17-8+deb10u1ubuntu0.2 | UNKNOWN |
ubuntu | 20.04 | noarch | apache-log4j1.2 | <Β 1.2.17-9ubuntu0.2 | UNKNOWN |
ubuntu | 23.10 | noarch | apache-log4j1.2 | <Β any | UNKNOWN |
ubuntu | 14.04 | noarch | apache-log4j1.2 | <Β any | UNKNOWN |
ubuntu | 16.04 | noarch | apache-log4j1.2 | <Β 1.2.17-7ubuntu1+esm1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2022-23305
lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y
logging.apache.org/log4j/1.2/index.html
nvd.nist.gov/vuln/detail/CVE-2022-23305
security-tracker.debian.org/tracker/CVE-2022-23305
ubuntu.com/security/notices/USN-5998-1
www.cve.org/CVERecord?id=CVE-2022-23305
www.openwall.com/lists/oss-security/2022/01/18/4
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.9%