| Summary | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. |
|---|---|
| Publication Date | Dec. 14, 2021, 9:15 p.m. |
| Registration Date | Dec. 15, 2021, 10 a.m. |
| Last Update | Nov. 21, 2024, 3:36 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 7.5 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃に必要な特権レベル(PR) | 低 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 6.0 |
|---|---|
| Vector | AV:N/AC:M/Au:S/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 単一 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:apache:log4j:1.2:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_a-mq_streaming:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:* | |||||
| cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:* | |||||
| cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:healthcare_data_repository:8.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:* | |||||
| cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:retail_allocation:14.1.3.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:retail_allocation:15.0.3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:retail_allocation:16.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:retail_allocation:19.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:* | 11.2.8.0 | ||||
| cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* | 8.0.29 | ||||
| cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:* | 11.2.8.0 | ||||
| cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:fusion_middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:timesten_grid:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:* | 12.0.0.4.0 | ||||
| cpe:2.3:a:oracle:stream_analytics:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:goldengate:-:*:*:*:*:*:*:* | |||||
| Title | Log4j における信頼できないデータのデシリアライゼーションに関する脆弱性 |
|---|---|
| Summary | Log4j には、信頼できないデータのデシリアライゼーションに関する脆弱性が存在します。 本脆弱性は、CVE-2021-44228 と関連する脆弱性です。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Dec. 10, 2021, midnight |
| Registration Date | Dec. 8, 2022, 2:30 p.m. |
| Last Update | Dec. 8, 2022, 2:30 p.m. |
| レッドハット |
| Integration Camel K |
| Integration Camel Quarkus |
| Red Hat CodeReady Studio |
| Red Hat JBoss A-MQ |
| Apache Software Foundation |
| Apache Log4j 1.2 |
| オラクル |
| Oracle Advanced Supply Chain Planning |
| Oracle Business Intelligence |
| Oracle Business Process Management Suite |
| Oracle Communications Eagle Ftp Table Base Retrieval |
| Fedora Project |
| Fedora |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2022年12月08日] 掲載 |
Dec. 8, 2022, 2:30 p.m. |