CVE-2021-42550
RCE from attacker with configuration edit priviledges through JNDI lookup
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
En logback versiones 1.2.7 y anteriores, un atacante con los privilegios necesarios para editar archivos de configuración podría diseñar una configuración maliciosa que permitiera ejecutar código arbitrario cargado desde servidores LDAP
A flaw was found in the logback package. When using a specially-crafted configuration, this issue could allow a remote authenticated attacker to execute arbitrary code loaded from LDAP servers.
Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model & Notation execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. This release of Red Hat Decision Manager 7.12.1 serves as an update to Red Hat Decision Manager 7.12.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, denial of service, information leakage, and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-10-15 CVE Reserved
- 2021-12-16 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2022/Jul/11 | Mailing List |
|
https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf | Third Party Advisory |
|
https://security.netapp.com/advisory/ntap-20211229-0001 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://logback.qos.ch/news.html | 2022-12-12 | |
https://access.redhat.com/security/cve/CVE-2021-42550 | 2022-07-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2033560 | 2022-07-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | <= 1.2.7 Search vendor "Qos" for product "Logback" and version " <= 1.2.7" | - |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha0 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha1 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha10 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha2 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha3 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha4 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha5 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha6 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha7 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha8 |
Affected
| ||||||
Qos Search vendor "Qos" | Logback Search vendor "Qos" for product "Logback" | 1.3.0 Search vendor "Qos" for product "Logback" and version "1.3.0" | alpha9 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Satellite Search vendor "Redhat" for product "Satellite" | 6.0 Search vendor "Redhat" for product "Satellite" and version "6.0" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Cloud Manager Search vendor "Netapp" for product "Cloud Manager" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Service Level Manager Search vendor "Netapp" for product "Service Level Manager" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Snap Creator Framework Search vendor "Netapp" for product "Snap Creator Framework" | - | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sinec Nms Search vendor "Siemens" for product "Sinec Nms" | < 1.0.3 Search vendor "Siemens" for product "Sinec Nms" and version " < 1.0.3" | - |
Affected
|