Gal-Doron / addBranchTest

0 stars 0 forks source link

CVE-2021-45105 (Medium) detected in log4j-core-2.14.0.jar - autoclosed #17

Closed mend-for-github-com[bot] closed 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2021-45105 - Medium Severity Vulnerability

Vulnerable Library - log4j-core-2.14.0.jar

The Apache Log4j Implementation

Library home page: https://logging.apache.org/log4j/2.x/

Path to dependency file: /pom.xml

Path to vulnerable library: /ository/org/apache/logging/log4j/log4j-core/2.14.0/log4j-core-2.14.0.jar

Dependency Hierarchy: - :x: **log4j-core-2.14.0.jar** (Vulnerable Library)

Found in HEAD commit: 14630381db579192f973892f8d333f24f5c7260f

Found in base branch: main

Vulnerability Details

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

Publish Date: 2021-12-18

URL: CVE-2021-45105

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://logging.apache.org/log4j/2.x/security.html

Release Date: 2021-12-18

Fix Resolution: 2.17.0


:rescue_worker_helmet: Automatic Remediation is available for this issue

mend-for-github-com[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.