CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.0%
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of
untrusted data when the attacker has write access to the Log4j
configuration or if the configuration references an LDAP service the
attacker has access to. The attacker can provide a
TopicConnectionFactoryBindingName configuration causing JMSSink to perform
JNDI requests that result in remote code execution in a similar fashion to
CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically
configured to use JMSSink, which is not the default. Apache Log4j 1.2
reached end of life in August 2015. Users should upgrade to Log4j 2 as it
addresses numerous other issues from the previous versions.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | apache-log4j1.2 | < 1.2.17-8+deb10u1ubuntu0.2 | UNKNOWN |
ubuntu | 20.04 | noarch | apache-log4j1.2 | < 1.2.17-9ubuntu0.2 | UNKNOWN |
ubuntu | 24.04 | noarch | apache-log4j1.2 | < any | UNKNOWN |
ubuntu | 14.04 | noarch | apache-log4j1.2 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | apache-log4j1.2 | < 1.2.17-7ubuntu1+esm1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2022-23302
lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w
logging.apache.org/log4j/1.2/index.html
nvd.nist.gov/vuln/detail/CVE-2022-23302
security-tracker.debian.org/tracker/CVE-2022-23302
ubuntu.com/security/notices/USN-5998-1
www.cve.org/CVERecord?id=CVE-2022-23302
www.openwall.com/lists/oss-security/2022/01/18/3
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.0%