CVE-2019-17571 (Critical) detected in log4j-1.2.17.jar
mend-bolt-for-github opened this issue · comments
CVE-2019-17571 - Critical Severity Vulnerability
Vulnerable Library - log4j-1.2.17.jar
Apache Log4j 1.2
Path to dependency file: /owner-extras/pom.xml
Path to vulnerable library: /owner-extras/pom.xml
Dependency Hierarchy:
- curator-framework-4.3.0.jar (Root Library)
- curator-client-4.3.0.jar
- zookeeper-3.5.7.jar
- ❌ log4j-1.2.17.jar (Vulnerable Library)
- zookeeper-3.5.7.jar
- curator-client-4.3.0.jar
Found in HEAD commit: 12e21721ff1098fe44de120bf2737fd994f40fa6
Found in base branch: master
Vulnerability Details
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
Publish Date: 2019-12-20
URL: CVE-2019-17571
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2019-12-20
Fix Resolution: log4j-manual - 1.2.17-16;log4j-javadoc - 1.2.17-16;log4j - 1.2.17-16,1.2.17-16
Step up your Open Source Security Game with Mend here