ch.qos.logback:logback-core@1.3.10 vulnerabilities

  • latest version

    1.5.19

  • latest non vulnerable version

  • first published

    19 years ago

  • latest version published

    15 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the ch.qos.logback:logback-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    External Initialization of Trusted Variables or Data Stores

    ch.qos.logback:logback-core is a logback-core module.

    Affected versions of this package are vulnerable to External Initialization of Trusted Variables or Data Stores via the conditional processing of the logback.xml configuration file when both the Janino library and Spring Framework are present on the class path. An attacker can execute arbitrary code by compromising an existing configuration file or injecting a malicious environment variable before program execution. This is only exploitable if the attacker has write access to a configuration file or can set a malicious environment variable.

    How to fix External Initialization of Trusted Variables or Data Stores?

    Upgrade ch.qos.logback:logback-core to version 1.5.19 or higher.

    [,1.5.19)
    • M
    Improper Neutralization of Special Elements

    ch.qos.logback:logback-core is a logback-core module.

    Affected versions of this package are vulnerable to Improper Neutralization of Special Elements via the JaninoEventEvaluator extension. An attacker can execute arbitrary code by compromising an existing logback configuration file or injecting an environment variable before program execution.

    How to fix Improper Neutralization of Special Elements?

    Upgrade ch.qos.logback:logback-core to version 1.3.15, 1.5.13 or higher.

    [,1.3.15)[1.4.0,1.5.13)
    • L
    Server-side Request Forgery (SSRF)

    ch.qos.logback:logback-core is a logback-core module.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the SaxEventRecorder process. An attacker can forge requests by compromising logback configuration files in XML.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade ch.qos.logback:logback-core to version 1.3.15, 1.5.13 or higher.

    [,1.3.15)[1.4.0,1.5.13)
    • H
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    ch.qos.logback:logback-core is a logback-core module.

    Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') via the logback receiver component. An attacker can mount a denial-of-service attack by sending poisoned data.

    Note:

    Successful exploitation requires the logback-receiver component being enabled and also reachable by the attacker.

    How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')?

    Upgrade ch.qos.logback:logback-core to version 1.2.13, 1.3.14, 1.4.14 or higher.

    [,1.2.13)[1.3.0,1.3.14)[1.4.0,1.4.14)
    • H
    Denial of Service (DoS)

    ch.qos.logback:logback-core is a logback-core module.

    Affected versions of this package are vulnerable to Denial of Service (DoS). An attacker can mount a denial-of-service attack by sending poisoned data. This is only exploitable if logback receiver component is deployed.

    How to fix Denial of Service (DoS)?

    Upgrade ch.qos.logback:logback-core to version 1.2.13, 1.3.12, 1.4.12 or higher.

    [,1.2.13)[1.3.0-alpha0,1.3.12)[1.4.0,1.4.12)