JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Log4j
Subscribe
|
|
Broadcom
Subscribe
|
Brocade Sannav
Subscribe
|
|
Netapp
Subscribe
|
Snapmanager
Subscribe
|
|
Oracle
Subscribe
|
Advanced Supply Chain Planning
Subscribe
Business Intelligence
Subscribe
Business Process Management Suite
Subscribe
Communications Eagle Ftp Table Base Retrieval
Subscribe
Communications Instant Messaging Server
Subscribe
Communications Messaging Server
Subscribe
Communications Network Integrity
Subscribe
Communications Offline Mediation Controller
Subscribe
Communications Unified Inventory Management
Subscribe
E-business Suite Cloud Manager And Cloud Backup Module
Subscribe
Enterprise Manager Base Platform
Subscribe
Financial Services Revenue Management And Billing Analytics
Subscribe
Healthcare Foundation
Subscribe
Hyperion Data Relationship Management
Subscribe
Hyperion Infrastructure Technology
Subscribe
Identity Management Suite
Subscribe
Identity Manager Connector
Subscribe
Jdeveloper
Subscribe
Middleware Common Libraries And Tools
Subscribe
Mysql Enterprise Monitor
Subscribe
Tuxedo
Subscribe
Weblogic Server
Subscribe
|
|
Qos
Subscribe
|
Reload4j
Subscribe
|
|
Redhat
Subscribe
|
Amq Streams
Subscribe
Enterprise Linux
Subscribe
Jboss Amq
Subscribe
Jboss Data Grid
Subscribe
Jboss Data Virtualization
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Eus
Subscribe
Jboss Enterprise Web Server
Subscribe
Jboss Fuse
Subscribe
Red Hat Single Sign On
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Els
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Rhel Tus
Subscribe
Rhev Manager
Subscribe
Rhosemc
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2905-1 | apache-log4j1.2 security update |
EUVD |
EUVD-2022-0721 | JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. |
Github GHSA |
GHSA-w9p3-5cr8-m3jj | Deserialization of Untrusted Data in Log4j 1.x |
Ubuntu USN |
USN-5998-1 | Apache Log4j vulnerabilities |
Ubuntu USN |
USN-7590-1 | Apache Log4j vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
Users should upgrade to Log4j 2 or remove usage of the JMSSink from their configurations.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 07 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 26 Aug 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Application Platform Eus
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7 | |
| Vendors & Products |
Redhat jboss Enterprise Application Platform Eus
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-07-07T17:47:01.136Z
Reserved: 2022-01-16T00:00:00.000Z
Link: CVE-2022-23302
No data.
Status : Modified
Published: 2022-01-18T16:15:08.300
Modified: 2025-07-07T18:15:24.713
Link: CVE-2022-23302
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN