CVE-2024-12798 (GCVE-0-2024-12798)

Vulnerability from cvelistv5 – Published: 2024-12-19 15:14 – Updated: 2025-01-03 13:38
VLAI?
Summary
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
CWE
  • CWE-917 - Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
Assigner
Impacted products
Vendor Product Version
QOS.CH Sarl Logback-core Affected: 0.1 , ≤ 1.3.14 (maven)
Affected: 1.4.0 , ≤ 1.5.12 (maven)
Unaffected: 1.3.15
Unaffected: 1.5.13
Create a notification for this product.
Credits
7asecurity
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12798",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-20T20:17:18.406704Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-20T20:17:33.360Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "logback-core"
          ],
          "product": "Logback-core",
          "vendor": "QOS.CH Sarl",
          "versions": [
            {
              "lessThanOrEqual": "1.3.14",
              "status": "affected",
              "version": "0.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "1.5.12",
              "status": "affected",
              "version": "1.4.0",
              "versionType": "maven"
            },
            {
              "status": "unaffected",
              "version": "1.3.15"
            },
            {
              "status": "unaffected",
              "version": "1.5.13"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "7asecurity"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003eACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\n      upto including version 0.1 to 1.3.14 and\u0026nbsp;1.4.0 to 1.5.12 in Java applications allows\n      attacker to execute arbitrary code by compromising an existing\n      logback configuration file or by injecting an environment variable\n      before program execution.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eMalicious logback configuration files can allow the attacker to execute \narbitrary code using the JaninoEventEvaluator extension.\n\u003cbr\u003e\n\u003cbr\u003eA successful attack requires the user to have write access to a \nconfiguration file. Alternatively, the attacker could inject a malicious \nenvironment variable pointing to a malicious configuration file. In both \ncases, the attack requires existing privilege.\n\n\n\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e"
            }
          ],
          "value": "ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\n      upto including version 0.1 to 1.3.14 and\u00a01.4.0 to 1.5.12 in Java applications allows\n      attacker to execute arbitrary code by compromising an existing\n      logback configuration file or by injecting an environment variable\n      before program execution.\n\n\n\n\n\nMalicious logback configuration files can allow the attacker to execute \narbitrary code using the JaninoEventEvaluator extension.\n\n\n\nA successful attack requires the user to have write access to a \nconfiguration file. Alternatively, the attacker could inject a malicious \nenvironment variable pointing to a malicious configuration file. In both \ncases, the attack requires existing privilege."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "No known exploitation\u003cbr\u003e"
            }
          ],
          "value": "No known exploitation"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-242",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-242 Code Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "LOW",
            "providerUrgency": "CLEAR",
            "subAvailabilityImpact": "LOW",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "LOW"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-917",
              "description": "CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-03T13:38:58.152Z",
        "orgId": "455daabc-a392-441d-aa46-37d35189897c",
        "shortName": "NCSC.ch"
      },
      "references": [
        {
          "url": "https://logback.qos.ch/news.html#1.5.13"
        },
        {
          "url": "https://logback.qos.ch/news.html#1.3.15"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Remove Janino from the Java classpath. Alternatively, update to logback \nversion 1.5.13 or later. If you are using the 1.3.x series, update to \nlogback version 1.3.15 or later. Note that the 1.4.x series remains \nvulnerable."
            }
          ],
          "value": "Remove Janino from the Java classpath. Alternatively, update to logback \nversion 1.5.13 or later. If you are using the 1.3.x series, update to \nlogback version 1.3.15 or later. Note that the 1.4.x series remains \nvulnerable."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "JaninoEventEvaluator\u00a0vulnerability",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Remove Janino from the Java classpath. Alternatively, update to logback \nversion 1.5.13 or later. If you are using the 1.3.x series, update to \nlogback version 1.3.15 or later. Note that the 1.4.x series remains \nvulnerable."
            }
          ],
          "value": "Remove Janino from the Java classpath. Alternatively, update to logback \nversion 1.5.13 or later. If you are using the 1.3.x series, update to \nlogback version 1.3.15 or later. Note that the 1.4.x series remains \nvulnerable."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "455daabc-a392-441d-aa46-37d35189897c",
    "assignerShortName": "NCSC.ch",
    "cveId": "CVE-2024-12798",
    "datePublished": "2024-12-19T15:14:21.598Z",
    "dateReserved": "2024-12-19T14:21:00.178Z",
    "dateUpdated": "2025-01-03T13:38:58.152Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\\n      upto including version 0.1 to 1.3.14 and\\u00a01.4.0 to 1.5.12 in Java applications allows\\n      attacker to execute arbitrary code by compromising an existing\\n      logback configuration file or by injecting an environment variable\\n      before program execution.\\n\\n\\n\\n\\n\\nMalicious logback configuration files can allow the attacker to execute \\narbitrary code using the JaninoEventEvaluator extension.\\n\\n\\n\\nA successful attack requires the user to have write access to a \\nconfiguration file. Alternatively, the attacker could inject a malicious \\nenvironment variable pointing to a malicious configuration file. In both \\ncases, the attack requires existing privilege.\"}, {\"lang\": \"es\", \"value\": \"La vulnerabilidad ACE en JaninoEventEvaluator por parte de QOS.CH logback-core hasta la versi\\u00f3n 1.5.12 incluida en aplicaciones Java permite al atacante ejecutar c\\u00f3digo arbitrario comprometiendo un archivo de configuraci\\u00f3n de logback existente o inyectando una variable de entorno antes de la ejecuci\\u00f3n del programa. Los archivos de configuraci\\u00f3n de logback maliciosos pueden permitir al atacante ejecutar c\\u00f3digo arbitrario utilizando la extensi\\u00f3n JaninoEventEvaluator. Un ataque exitoso requiere que el usuario tenga acceso de escritura a un archivo de configuraci\\u00f3n. Alternativamente, el atacante podr\\u00eda inyectar una variable de entorno maliciosa que apunte a un archivo de configuraci\\u00f3n malicioso. En ambos casos, el ataque requiere privilegios existentes.\"}]",
      "id": "CVE-2024-12798",
      "lastModified": "2025-01-03T14:15:24.370",
      "metrics": "{\"cvssMetricV40\": [{\"source\": \"vulnerability@ncsc.ch\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:Clear\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"PASSIVE\", \"vulnerableSystemConfidentiality\": \"LOW\", \"vulnerableSystemIntegrity\": \"HIGH\", \"vulnerableSystemAvailability\": \"LOW\", \"subsequentSystemConfidentiality\": \"LOW\", \"subsequentSystemIntegrity\": \"HIGH\", \"subsequentSystemAvailability\": \"LOW\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"LOW\", \"providerUrgency\": \"CLEAR\"}}]}",
      "published": "2024-12-19T16:15:07.557",
      "references": "[{\"url\": \"https://logback.qos.ch/news.html#1.3.15\", \"source\": \"vulnerability@ncsc.ch\"}, {\"url\": \"https://logback.qos.ch/news.html#1.5.13\", \"source\": \"vulnerability@ncsc.ch\"}]",
      "sourceIdentifier": "vulnerability@ncsc.ch",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"vulnerability@ncsc.ch\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-917\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-12798\",\"sourceIdentifier\":\"vulnerability@ncsc.ch\",\"published\":\"2024-12-19T16:15:07.557\",\"lastModified\":\"2025-01-03T14:15:24.370\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\\n      upto including version 0.1 to 1.3.14 and\u00a01.4.0 to 1.5.12 in Java applications allows\\n      attacker to execute arbitrary code by compromising an existing\\n      logback configuration file or by injecting an environment variable\\n      before program execution.\\n\\n\\n\\n\\n\\nMalicious logback configuration files can allow the attacker to execute \\narbitrary code using the JaninoEventEvaluator extension.\\n\\n\\n\\nA successful attack requires the user to have write access to a \\nconfiguration file. Alternatively, the attacker could inject a malicious \\nenvironment variable pointing to a malicious configuration file. In both \\ncases, the attack requires existing privilege.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad ACE en JaninoEventEvaluator por parte de QOS.CH logback-core hasta la versi\u00f3n 1.5.12 incluida en aplicaciones Java permite al atacante ejecutar c\u00f3digo arbitrario comprometiendo un archivo de configuraci\u00f3n de logback existente o inyectando una variable de entorno antes de la ejecuci\u00f3n del programa. Los archivos de configuraci\u00f3n de logback maliciosos pueden permitir al atacante ejecutar c\u00f3digo arbitrario utilizando la extensi\u00f3n JaninoEventEvaluator. Un ataque exitoso requiere que el usuario tenga acceso de escritura a un archivo de configuraci\u00f3n. Alternativamente, el atacante podr\u00eda inyectar una variable de entorno maliciosa que apunte a un archivo de configuraci\u00f3n malicioso. En ambos casos, el ataque requiere privilegios existentes.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"vulnerability@ncsc.ch\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:Clear\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"LOW\",\"subIntegrityImpact\":\"HIGH\",\"subAvailabilityImpact\":\"LOW\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"LOW\",\"providerUrgency\":\"CLEAR\"}}]},\"weaknesses\":[{\"source\":\"vulnerability@ncsc.ch\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-917\"}]}],\"references\":[{\"url\":\"https://logback.qos.ch/news.html#1.3.15\",\"source\":\"vulnerability@ncsc.ch\"},{\"url\":\"https://logback.qos.ch/news.html#1.5.13\",\"source\":\"vulnerability@ncsc.ch\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-12798\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-20T20:17:18.406704Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-20T20:17:28.533Z\"}}], \"cna\": {\"title\": \"JaninoEventEvaluator\\u00a0vulnerability\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"7asecurity\"}], \"impacts\": [{\"capecId\": \"CAPEC-242\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-242 Code Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 5.9, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear\", \"providerUrgency\": \"CLEAR\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"LOW\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"LOW\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"QOS.CH Sarl\", \"modules\": [\"logback-core\"], \"product\": \"Logback-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.1\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"1.3.14\"}, {\"status\": \"affected\", \"version\": \"1.4.0\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"1.5.12\"}, {\"status\": \"unaffected\", \"version\": \"1.3.15\"}, {\"status\": \"unaffected\", \"version\": \"1.5.13\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"No known exploitation\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"No known exploitation\u003cbr\u003e\", \"base64\": false}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Remove Janino from the Java classpath. Alternatively, update to logback \\nversion 1.5.13 or later. If you are using the 1.3.x series, update to \\nlogback version 1.3.15 or later. Note that the 1.4.x series remains \\nvulnerable.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Remove Janino from the Java classpath. Alternatively, update to logback \\nversion 1.5.13 or later. If you are using the 1.3.x series, update to \\nlogback version 1.3.15 or later. Note that the 1.4.x series remains \\nvulnerable.\", \"base64\": false}]}], \"references\": [{\"url\": \"https://logback.qos.ch/news.html#1.5.13\"}, {\"url\": \"https://logback.qos.ch/news.html#1.3.15\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Remove Janino from the Java classpath. Alternatively, update to logback \\nversion 1.5.13 or later. If you are using the 1.3.x series, update to \\nlogback version 1.3.15 or later. Note that the 1.4.x series remains \\nvulnerable.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Remove Janino from the Java classpath. Alternatively, update to logback \\nversion 1.5.13 or later. If you are using the 1.3.x series, update to \\nlogback version 1.3.15 or later. Note that the 1.4.x series remains \\nvulnerable.\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\\n      upto including version 0.1 to 1.3.14 and\\u00a01.4.0 to 1.5.12 in Java applications allows\\n      attacker to execute arbitrary code by compromising an existing\\n      logback configuration file or by injecting an environment variable\\n      before program execution.\\n\\n\\n\\n\\n\\nMalicious logback configuration files can allow the attacker to execute \\narbitrary code using the JaninoEventEvaluator extension.\\n\\n\\n\\nA successful attack requires the user to have write access to a \\nconfiguration file. Alternatively, the attacker could inject a malicious \\nenvironment variable pointing to a malicious configuration file. In both \\ncases, the attack requires existing privilege.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cdiv\u003eACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\\n      upto including version 0.1 to 1.3.14 and\u0026nbsp;1.4.0 to 1.5.12 in Java applications allows\\n      attacker to execute arbitrary code by compromising an existing\\n      logback configuration file or by injecting an environment variable\\n      before program execution.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eMalicious logback configuration files can allow the attacker to execute \\narbitrary code using the JaninoEventEvaluator extension.\\n\u003cbr\u003e\\n\u003cbr\u003eA successful attack requires the user to have write access to a \\nconfiguration file. Alternatively, the attacker could inject a malicious \\nenvironment variable pointing to a malicious configuration file. In both \\ncases, the attack requires existing privilege.\\n\\n\\n\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-917\", \"description\": \"CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"455daabc-a392-441d-aa46-37d35189897c\", \"shortName\": \"NCSC.ch\", \"dateUpdated\": \"2025-01-03T13:38:58.152Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-12798\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-03T13:38:58.152Z\", \"dateReserved\": \"2024-12-19T14:21:00.178Z\", \"assignerOrgId\": \"455daabc-a392-441d-aa46-37d35189897c\", \"datePublished\": \"2024-12-19T15:14:21.598Z\", \"assignerShortName\": \"NCSC.ch\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…