IBM Transformation Extender Advanced, previously known as IBM Standards Processing Engine, uses Apache Log4j as part of its logging infrastructure. An arbitrary remote code execution vulnerability has been addressed. The fix incudes Apache Log4j 2.17.1.
CVEID:CVE-2021-4104
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data when the attacker has write access to the Log4j configuration. If the deployed application is configured to use JMSAppender, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/215048 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
IBM Transformation Extender Advanced | 9.0 |
IBM Transformation Extender Advanced | 10.0 |
Product | Version | Remediation/Fix |
---|---|---|
IBM Transformation Extender Advanced | 9.0 | 9.0.2.6 |
IBM Transformation Extender Advanced | 10.0 | 10.0.1.7 |
None
CPE | Name | Operator | Version |
---|---|---|---|
ibm transformation extender advanced | eq | 9.0. | |
ibm transformation extender advanced | eq | 10.0. |