Open mend-bolt-for-github[bot] opened 4 years ago
Issue-Label Bot is automatically applying the label bug
to this issue, with a confidence of 0.87. Please mark this comment with :thumbsup: or :thumbsdown: to give our bot feedback!
Links: app homepage, dashboard and code for this bot.
CVE-2020-9488 - Low Severity Vulnerability
Vulnerable Library - log4j-1.2.17.jar
Apache Log4j 1.2
Path to dependency file: /tmp/ws-scm/JBrew/concurrent/pom.xml
Path to vulnerable library: epository/log4j/log4j/1.2.17/log4j-1.2.17.jar,epository/log4j/log4j/1.2.17/log4j-1.2.17.jar,epository/log4j/log4j/1.2.17/log4j-1.2.17.jar,epository/log4j/log4j/1.2.17/log4j-1.2.17.jar
Dependency Hierarchy: - :x: **log4j-1.2.17.jar** (Vulnerable Library)
Found in HEAD commit: 333f014c4ebf46f6cc734f9f87f9b360bc61661d
Vulnerability Details
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.
Publish Date: 2020-04-27
URL: CVE-2020-9488
CVSS 3 Score Details (3.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://issues.apache.org/jira/browse/LOG4J2-2819
Release Date: 2020-04-27
Fix Resolution: org.apache.logging.log4j:log4j-core:2.13.2
Step up your Open Source Security Game with WhiteSource here