daniel-brown-ws-test / verademo

A deliberately insecure Java web application
MIT License
0 stars 0 forks source link

CVE-2020-9488 (Low) detected in log4j-1.2.17.jar #326

Open whitesource-app-bolt-danbrown[bot] opened 1 year ago

whitesource-app-bolt-danbrown[bot] commented 1 year ago

CVE-2020-9488 - Low Severity Vulnerability

Vulnerable Library - log4j-1.2.17.jar

Apache Log4j 1.2

Path to dependency file: /app/pom.xml

Path to vulnerable library: /C:/Users/DanielBrown/.m2/repository/log4j/log4j/1.2.17/log4j-1.2.17.jar

Dependency Hierarchy: - slf4j-log4j12-1.7.7.jar (Root Library) - :x: **log4j-1.2.17.jar** (Vulnerable Library)

Found in HEAD commit: 3f927c4704a4b5f8c1f0a78b5569f9a0931229d6

Found in base branch: main

Vulnerability Details

Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1

Publish Date: 2020-04-27

URL: CVE-2020-9488

CVSS 3 Score Details (3.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://reload4j.qos.ch/

Release Date: 2020-04-27

Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.3