CVE-2021-44832
MEDIUM WAF: Medium
CVSS 6.6
Published: 2021-12-28
CWE-20 CWE-20
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
WAF Coverage Analysis
Improper Input Validation
Medium WAF Coverage
OWASP: A03:2021 Injection
920xxx - Protocol Enforcement 941xxx - XSS / XXE 942xxx - SQL Injection
Improper Input Validation
Medium WAF Coverage
OWASP: A03:2021 Injection
920xxx - Protocol Enforcement 941xxx - XSS / XXE 942xxx - SQL Injection
Affected Software
| Vendor | Product | Version |
|---|---|---|
| apache | log4j | 2.0.1 - 2.3.2 |
| apache | log4j | 2.4 - 2.12.4 |
| apache | log4j | 2.13.0 - 2.17.1 |
| apache | log4j | 2.0 |
| apache | log4j | 2.0 |
| apache | log4j | 2.0 |
| apache | log4j | 2.0 |
| apache | log4j | 2.0 |
| apache | log4j | 2.0 |
| oracle | communications_diameter_signaling_router | 8.0.0.0 - 8.5.1.0 |
References
- www.openwall.com (Mailing List, Third Party Advisory)
- cert-portal.siemens.com (Third Party Advisory)
- issues.apache.org (Issue Tracking, Patch, Vendor Advisory)
- lists.apache.org (Mailing List, Vendor Advisory)
- lists.debian.org (Mailing List, Third Party Advisory)
- lists.fedoraproject.org
- lists.fedoraproject.org
- security.netapp.com (Third Party Advisory)
- tools.cisco.com (Third Party Advisory)
- www.oracle.com (Patch, Third Party Advisory)