Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
Base score: 9.8 Exploit score: 3.9 Impact score: 5.9
Base Score (vectoral): CVSS:3.1 - AV:N - AC:L - PR:N - UI:N - S:U - C:H - I:H - A:H
Base score: 7.5 Exploit score: 10 Impact score: 6.4
Base Score (vectoral): CVSS:2.0 - AV:N - AC:L - Au:N - C:P - I:P - A:P
Last Modified: Dec 14, 2022
cpe:2.3:a:apache:bookkeeper:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_lending_and_leasing:12.5.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_extract_transform_and_load:19.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
[CONFIRM] https://security.netapp.com/advisory/ntap-20200110-0001/ Third Party Advisory
[SUSE] openSUSE-SU-2020:0051 Mailing List, Third Party Advisory
[MLIST] [jena-dev] 20200318 Re: Logging (JENA-1005) Mailing List, Vendor Advisory
[N/A] N/A Third Party Advisory
[DEBIAN] DSA-4686 Third Party Advisory
[MISC] https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
[UBUNTU] USN-4495-1 Third Party Advisory
[MLIST] [kafka-users] 20210210 Security: CVE-2019-17571 (log4j) Mailing List, Vendor Advisory
[MISC] https://www.oracle.com/security-alerts/cpuApr2021.html Patch, Third Party Advisory
[MLIST] [kafka-users] 20210617 vulnerabilities Mailing List, Third Party Advisory
[MLIST] [activemq-users] 20210830 Security issues Mailing List, Third Party Advisory
[MLIST] [activemq-users] 20210831 RE: Security issues Mailing List, Third Party Advisory
[MISC] https://www.oracle.com/security-alerts/cpuapr2022.html Patch, Third Party Advisory