CVE-2021-44832

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-44832
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-44832.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-44832
Aliases
Downstream
Related
Published
2021-12-28T20:15:08Z
Modified
2025-08-09T19:01:28Z
Severity
  • 6.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

References

Affected packages

Git / github.com/apache/logging-log4j2

Affected ranges

Type
GIT
Repo
https://github.com/apache/logging-log4j2
Events