In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.2.7"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha0"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha10"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha2"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha3"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha4"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha5"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha6"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha7"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha8"
},
{
"introduced": "0"
},
{
"last_affected": "1.3.0-alpha9"
},
{
"introduced": "0"
},
{
"fixed": "1.0.3"
}
]
}