ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core
upto and including version 1.5.12 in Java applications allows
attacker to execute arbitrary code by compromising an existing
logback configuration file or by injecting an environment variable
before program execution.
Malicious logback configuration files can allow the attacker to execute
arbitrary code using the JaninoEventEvaluator extension.
A successful attack requires the user to have write access to a
configuration file. Alternatively, the attacker could inject a malicious
environment variable pointing to a malicious configuration file. In both
cases, the attack requires existing privilege.
Metrics
Affected Vendors & Products
References
History
Sat, 21 Dec 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 20 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto and including version 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege. | |
Title | JaninoEventEvaluator vulnerability | |
Weaknesses | CWE-917 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: NCSC.ch
Published: 2024-12-19T15:14:21.598Z
Updated: 2024-12-20T20:17:33.360Z
Reserved: 2024-12-19T14:21:00.178Z
Link: CVE-2024-12798
Vulnrichment
Updated: 2024-12-20T20:17:28.533Z
NVD
Status : Received
Published: 2024-12-19T16:15:07.557
Modified: 2024-12-19T16:15:07.557
Link: CVE-2024-12798
Redhat