Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

Project Subscriptions

Vendors Products
Cloudcenter Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Communications Brm - Elastic Charging Engine Subscribe
Communications Diameter Signaling Router Subscribe
Communications Interactive Session Recorder Subscribe
Communications Offline Mediation Controller Subscribe
Flexcube Private Banking Subscribe
Health Sciences Data Management Workbench Subscribe
Policy Automation Subscribe
Policy Automation For Mobile Devices Subscribe
Primavera Gateway Subscribe
Primavera P6 Enterprise Project Portfolio Management Subscribe
Primavera Unifier Subscribe
Product Lifecycle Analytics Subscribe
Retail Assortment Planning Subscribe
Retail Fiscal Management Subscribe
Retail Order Broker Subscribe
Retail Xstore Point Of Service Subscribe
Siebel Ui Framework Subscribe
Weblogic Server Subscribe
Amq Streams Subscribe
Camel Quarkus Subscribe
Integration Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Fuse Subscribe
Logging Subscribe
Openshift Subscribe
Openshift Application Runtimes Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2870-1 apache-log4j2 security update
Github GHSA Github GHSA GHSA-8489-44mv-ggj8 Improper Input Validation and Injection in Apache Log4j2
Ubuntu USN Ubuntu USN USN-5222-1 Apache Log4j 2 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T04:32:13.076Z

Reserved: 2021-12-11T00:00:00

Link: CVE-2021-44832

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-28T20:15:08.400

Modified: 2024-11-21T06:31:34.783

Link: CVE-2021-44832

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-12-28T00:00:00Z

Links: CVE-2021-44832 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses