CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
17.0%
A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html
github.com/qos-ch/logback
github.com/qos-ch/logback/commit/9c782b45be4abdafb7e17481e24e7354c2acd1eb
github.com/qos-ch/logback/commit/b8eac23a9de9e05fb6d51160b3f46acd91af9731
github.com/qos-ch/logback/commit/bb095154be011267b64e37a1d401546e7cc2b7c3
github.com/qos-ch/logback/issues/745#issuecomment-1836227158
logback.qos.ch/manual/receivers.html
logback.qos.ch/news.html#1.2.13
logback.qos.ch/news.html#1.3.12
nvd.nist.gov/vuln/detail/CVE-2023-6378
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
17.0%