ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto and including version 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
History

Sat, 21 Dec 2024 02:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L'}

threat_severity

Moderate


Fri, 20 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 15:30:00 +0000

Type Values Removed Values Added
Description ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto and including version 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
Title JaninoEventEvaluator vulnerability
Weaknesses CWE-917
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published: 2024-12-19T15:14:21.598Z

Updated: 2024-12-20T20:17:33.360Z

Reserved: 2024-12-19T14:21:00.178Z

Link: CVE-2024-12798

cve-icon Vulnrichment

Updated: 2024-12-20T20:17:28.533Z

cve-icon NVD

Status : Received

Published: 2024-12-19T16:15:07.557

Modified: 2024-12-19T16:15:07.557

Link: CVE-2024-12798

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-12-19T15:14:21Z

Links: CVE-2024-12798 - Bugzilla