yaeljacobs67 / fs-agent

File system agent for integration with WhiteSource service
Apache License 2.0
0 stars 0 forks source link

CVE-2021-45105 (Medium) detected in log4j-core-2.6.1.jar #148

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2021-45105 - Medium Severity Vulnerability

Vulnerable Library - log4j-core-2.6.1.jar

The Apache Log4j Implementation

Path to dependency file: /fs-agent/test_input/gradle/build.gradle

Path to vulnerable library: /test_input/gradle/build.gradle

Dependency Hierarchy: - :x: **log4j-core-2.6.1.jar** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

Publish Date: 2021-12-18

URL: CVE-2021-45105

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://logging.apache.org/log4j/2.x/security.html

Release Date: 2021-12-18

Fix Resolution: 2.12.3