Server-side Request Forgery (SSRF) Affecting ch.qos.logback:logback-core package, versions [,1.15.13)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-CHQOSLOGBACK-8539865
  • published20 Dec 2024
  • disclosed19 Dec 2024
  • credit7asecurity

Introduced: 19 Dec 2024

NewCVE-2024-12801  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade ch.qos.logback:logback-core to version 1.15.13 or higher.

Overview

ch.qos.logback:logback-core is a logback-core module.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the SaxEventRecorder process. An attacker can forge requests by compromising logback configuration files in XML.

CVSS Scores

version 4.0
version 3.1