In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
{ "nvd_published_at": "2021-12-16T19:15:00Z", "cwe_ids": [ "CWE-502" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-12-17T19:25:11Z" }