By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

Project Subscriptions

Vendors Products
Broadcom Subscribe
Brocade Sannav Subscribe
Snapmanager Subscribe
Advanced Supply Chain Planning Subscribe
Business Intelligence Subscribe
Business Process Management Suite Subscribe
Communications Eagle Ftp Table Base Retrieval Subscribe
Communications Instant Messaging Server Subscribe
Communications Messaging Server Subscribe
Communications Network Integrity Subscribe
Communications Offline Mediation Controller Subscribe
Communications Unified Inventory Management Subscribe
E-business Suite Cloud Manager And Cloud Backup Module Subscribe
E-business Suite Information Discovery Subscribe
Enterprise Manager Base Platform Subscribe
Financial Services Revenue Management And Billing Analytics Subscribe
Healthcare Foundation Subscribe
Hyperion Data Relationship Management Subscribe
Hyperion Infrastructure Technology Subscribe
Identity Management Suite Subscribe
Identity Manager Connector Subscribe
Jdeveloper Subscribe
Middleware Common Libraries And Tools Subscribe
Mysql Enterprise Monitor Subscribe
Retail Extract Transform And Load Subscribe
Weblogic Server Subscribe
Reload4j Subscribe
Amq Streams Subscribe
Enterprise Linux Subscribe
Jboss Amq Subscribe
Jboss Data Grid Subscribe
Jboss Data Virtualization Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Enterprise Web Server Subscribe
Jboss Fuse Subscribe
Red Hat Single Sign On Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Software Collections Subscribe
Rhel Tus Subscribe
Rhev Manager Subscribe
Rhosemc Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2905-1 apache-log4j1.2 security update
Github GHSA Github GHSA GHSA-65fg-84f6-3jq3 SQL Injection in Log4j 1.2.x
Ubuntu USN Ubuntu USN USN-5998-1 Apache Log4j vulnerabilities
Ubuntu USN Ubuntu USN USN-7590-1 Apache Log4j vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Users should upgrade to Log4j 2 or remove usage of the JDBCAppender from their configurations.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.14404}

epss

{'score': 0.14411}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.14411}

epss

{'score': 0.14404}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.14997}

epss

{'score': 0.14411}


Mon, 25 Nov 2024 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7

Mon, 26 Aug 2024 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T03:36:20.421Z

Reserved: 2022-01-17T00:00:00

Link: CVE-2022-23305

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-18T16:15:08.350

Modified: 2024-11-21T06:48:22.517

Link: CVE-2022-23305

cve-icon Redhat

Severity : Important

Publid Date: 2022-01-18T00:00:00Z

Links: CVE-2022-23305 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses