In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
{ "github_reviewed_at": "2021-12-17T19:25:11Z", "severity": "MODERATE", "cwe_ids": [ "CWE-502" ], "github_reviewed": true, "nvd_published_at": "2021-12-16T19:15:00Z" }