Apache Software Foundation Apache Log4J2 vulnerabilities

3 known vulnerabilities affecting apache_software_foundation/apache_log4j2.

Total CVEs
3
CISA KEV
1
actively exploited
Public exploits
1
Exploited in wild
2
Severity breakdown
CRITICAL1MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2021-44832MEDIUMCVSS 6.6Exploited≥ log4j-core, < 2.17.12021-12-28
CVE-2021-44832 [MEDIUM] CWE-20 CVE-2021-44832: Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) a Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java
cvelistv5nvd
CVE-2021-45105MEDIUMCVSS 5.9≥ log4j-core, < 2.17.02021-12-18
CVE-2021-45105 [MEDIUM] CWE-20 CVE-2021-45105: Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from u Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
cvelistv5nvd
CVE-2021-44228CRITICALCVSS 10.0KEVPoC≥ 2.0-beta9, < log4j-core*2021-12-10
CVE-2021-44228 [CRITICAL] CWE-502 Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An a
cvelistv5