diff options
author | Dave Cottlehuber <dch@FreeBSD.org> | 2021-12-21 07:15:20 +0000 |
---|---|---|
committer | Dave Cottlehuber <dch@FreeBSD.org> | 2021-12-21 07:15:20 +0000 |
commit | 919580464f9db092e2796335f63b340f91b655dd (patch) | |
tree | 84a3c0144000ca8499c0e951bd327b82c0be282a /security/vuxml/vuln-2021.xml | |
parent | 4331b2073bf8e7f7f569fca28463e2f265382bd6 (diff) | |
download | ports-919580464f9db092e2796335f63b340f91b655dd.tar.gz ports-919580464f9db092e2796335f63b340f91b655dd.zip |
security/vuxml: add graylog RCE via log4j CVE-2021-45046
Security: CVE-2021-45046
Sponsored by: SkunkWerks, GmbH
Diffstat (limited to 'security/vuxml/vuln-2021.xml')
-rw-r--r-- | security/vuxml/vuln-2021.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 595c35c85b43..4b1ebdbbba0f 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,43 @@ + <vuln vid="650734b2-7665-4170-9a0a-eeced5e10a5e"> + <topic>graylog -- remote code execution in log4j from user-controlled log input</topic> + <affects> + <package> + <name>graylog</name> + <range><lt>4.2.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Apache Software Foundation reports:</p> + <blockquote cite="https://logging.apache.org/log4j/2.x/security.html"> + <p>It was found that the fix to address CVE-2021-44228 in Apache + Log4j 2.15.0 was incomplete in certain non-default + configurations. This could allows attackers with control over + Thread Context Map (MDC) input data when the logging + configuration uses a non-default Pattern Layout with either a + Context Lookup (for example, $${ctx:loginId}) or a Thread + Context Map pattern (%X, %mdc, or %MDC) to craft malicious input + data using a JNDI Lookup pattern resulting in a denial of + service (DOS) attack. Log4j 2.15.0 makes a best-effort attempt + to restrict JNDI LDAP lookups to localhost by default. Log4j + 2.16.0 fixes this issue by removing support for message lookup + patterns and disabling JNDI functionality by default. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-45046</cvename> + <url>https://github.com/Graylog2/graylog2-server/commit/d3e441f</url> + <url>https://github.com/Graylog2/graylog2-server/commit/dd24b85</url> + <url>https://logging.apache.org/log4j/2.x/security.html</url> + </references> + <dates> + <discovery>2021-11-14</discovery> + <entry>2021-12-17</entry> + </dates> + </vuln> + <vuln vid="ca982e2d-61a9-11ec-8be6-d4c9ef517024"> <topic>Apache httpd -- Multiple vulnerabilities</topic> <affects> |