ch.qos.logback:logback-classic@1.3.0-alpha9 vulnerabilities

  • latest version

    1.5.16

  • latest non vulnerable version

  • first published

    18 years ago

  • latest version published

    16 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the ch.qos.logback:logback-classic package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Neutralization of Special Elements

    ch.qos.logback:logback-classic is a reliable, generic, fast and flexible logging library for Java.

    Affected versions of this package are vulnerable to Improper Neutralization of Special Elements via the JaninoEventEvaluator extension. An attacker can execute arbitrary code by compromising an existing logback configuration file or injecting an environment variable before program execution.

    How to fix Improper Neutralization of Special Elements?

    Upgrade ch.qos.logback:logback-classic to version 1.3.15, 1.5.13 or higher.

    [,1.3.15)[1.4.0,1.5.13)
    • H
    Denial of Service (DoS)

    ch.qos.logback:logback-classic is a reliable, generic, fast and flexible logging library for Java.

    Affected versions of this package are vulnerable to Denial of Service (DoS). An attacker can mount a denial-of-service attack by sending poisoned data. This is only exploitable if logback receiver component is deployed.

    How to fix Denial of Service (DoS)?

    Upgrade ch.qos.logback:logback-classic to version 1.2.13, 1.3.12, 1.4.12 or higher.

    [,1.2.13)[1.3.0-alpha0,1.3.12)[1.4.0,1.4.12)