Deserialization of Untrusted Data in Log4j
Critical severity
GitHub Reviewed
Published
Jan 6, 2020
to the GitHub Advisory Database
•
Updated Oct 12, 2023
Description
Published by the National Vulnerability Database
Dec 20, 2019
Reviewed
Dec 27, 2019
Published to the GitHub Advisory Database
Jan 6, 2020
Last updated
Oct 12, 2023
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions 1.2 up to 1.2.17.
Users are advised to migrate to
org.apache.logging.log4j:log4j-core
.References