Open mend-bolt-for-github[bot] opened 3 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
:information_source: This issue was automatically re-opened by WhiteSource because the vulnerable library in the specific branch(es) has been detected in the WhiteSource inventory.
CVE-2020-9488 - Low Severity Vulnerability
Vulnerable Libraries - log4j-1.2.15.jar, log4j-1.2.8.jar
log4j-1.2.15.jar
Apache Log4j 1.2
Library home page: http://logging.apache.org:80/log4j/1.2/
Path to vulnerable library: /lib/log4j-1.2.15.jar
Dependency Hierarchy: - :x: **log4j-1.2.15.jar** (Vulnerable Library)
log4j-1.2.8.jar
Path to vulnerable library: /lib/log4j-1.2.8.jar
Dependency Hierarchy: - :x: **log4j-1.2.8.jar** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1
Publish Date: 2020-04-27
URL: CVE-2020-9488
CVSS 3 Score Details (3.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://reload4j.qos.ch/
Release Date: 2020-04-27
Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.3
Step up your Open Source Security Game with Mend here