CVE-2024-12798
JaninoEventEvaluator vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto and including version 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
A flaw was found in Logback. This flaw allows a privileged attacker with write access to modify Logback configuration files or inject a malicious environment variable to execute arbitrary code via the JaninoEventEvaluator extension.
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution. Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension. A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
Red Hat build of Apache Camel 4.8.3 for Spring Boot release and security update is now available. Issues addressed include code execution and deserialization vulnerabilities.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-12-19 CVE Reserved
- 2024-12-19 CVE Published
- 2025-01-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
CAPEC
- CAPEC-242: Code Injection
References (4)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-12798 | 2025-02-05 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2333351 | 2025-02-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
QOS.CH Sarl Search vendor "QOS.CH Sarl" | Logback-core Search vendor "QOS.CH Sarl" for product "Logback-core" | >= 0.1.0 <= 1.3.14 Search vendor "QOS.CH Sarl" for product "Logback-core" and version " >= 0.1.0 <= 1.3.14" | en |
Affected
| ||||||
QOS.CH Sarl Search vendor "QOS.CH Sarl" | Logback-core Search vendor "QOS.CH Sarl" for product "Logback-core" | >= 1.4.0 <= 1.5.12 Search vendor "QOS.CH Sarl" for product "Logback-core" and version " >= 1.4.0 <= 1.5.12" | en |
Affected
|