ID

VAR-202112-1782


CVE

CVE-2021-45105


TITLE

Apache Log4j StrSubstitutor Uncontrolled Recursion Denial-of-Service Vulnerability

Trust: 0.7

sources: ZDI: ZDI-21-1541

DESCRIPTION

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Apache Log4j. Authentication is not required to exploit this vulnerability.The specific flaw exists within the StrSubstitutor class. The issue results from the lack of proper validation of user-supplied data, which can result in a resource exhaustion condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the process. Log4j is an open source project of Apache. By using Log4j, the destination of log information transmission can be controlled to be console, file, GUI component, even socket server, NT event recorder, etc. Apache Log4j2 has a denial of service vulnerability. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Installation instructions are available from the Fuse product documentation pages: Fuse 7.8: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/deploying_into_spring_boot/patch-red-hat-fuse-applications Fuse 7.9: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/deploying_into_spring_boot/patch-red-hat-fuse-applications Fuse 7.10: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/deploying_into_spring_boot/patch-red-hat-fuse-applications 4. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat build of Eclipse Vert.x 4.1.8 security update Advisory ID: RHSA-2022:0083-01 Product: Red Hat OpenShift Application Runtimes Advisory URL: https://access.redhat.com/errata/RHSA-2022:0083 Issue date: 2022-01-20 CVE Names: CVE-2021-44832 CVE-2021-45046 CVE-2021-45105 ==================================================================== 1. Summary: An update is now available for Red Hat build of Eclipse Vert.x. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE pages listed in the References section. 2. Description: This release of Red Hat build of Eclipse Vert.x 4.1.8 GA includes security updates. For more information, see the release notes listed in the References section. Security Fix(es): * log4j-core: remote code execution via JDBC Appender (CVE-2021-44832) * log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) (CVE-2021-45046) * log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern (CVE-2021-45105) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link for the update. You must be logged in to download the update. 4. Bugs fixed (https://bugzilla.redhat.com/): 2032580 - CVE-2021-45046 log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) 2034067 - CVE-2021-45105 log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern 2035951 - CVE-2021-44832 log4j-core: remote code execution via JDBC Appender 5. References: https://access.redhat.com/security/cve/CVE-2021-44832 https://access.redhat.com/security/cve/CVE-2021-45046 https://access.redhat.com/security/cve/CVE-2021-45105 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product\xcatRhoar.eclipse.vertx&version=4.1.8 https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.1/html/release_notes_for_eclipse_vert.x_4.1/index 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYemZRNzjgjWX9erEAQg3kg//TMRnMbFneaojfw2Cav3ewH7CQEqai/UQ 4nb5leVBZUlkoGk302d1Xlmjc8oYeyRHP2w95PuWfSqxpU5GhOabUjlJzul1Um34 Y0QaFhBI7xuAk28szn7JKoB6yZ6UAgB/vmYYo0YdlphtInAwnp3Vipb/3vgzXJUH eaFAkTvEMc4h0gcyLO98Krr/4u87+YJyY2wbWSpRDoQpQUcnDzGNqessOp6NMSsS mo0SHcFVYLXqsM9/cHaQyhIfTlF5JDApe0DO5y1zE60B1tYJyU34fgoRprFs5ybv f4Enn/qVWfmx2PCdEwOdKvjf2jQzVplqbPQwxILMRN2f3+y7OBNNWPB16kTskP3u jYUXZd6AN+YdJBzpBw23TFDmtSbGn9A3jTOWz1uACu3vYxNPSzDYIkOgD0hYfNIb dZntht5p3WgkBQ0Xkgd0At2UXwc70eJ2uH51Ck/bosH46MuKzVSeCoAsCCEXRMTm vGsfK5EV8Es5ltzsw1Im+3DZ8QcBNN7SUWidrJa9d6U9F0pzZVe1co4D12Xchapv bxQp0QeWHIgFNBQA8vQk6SZsdJH3THzHi0GUzLvSMED02MsfAd7HQhyndu/b9vs6 s2OIgauHd09+Siw1twydZUg1eEbeNctFUW2pi2LRggCY4cqLA0j4l0q0zQnKCdw3 73/w3ORRBdI=mx2F -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Description: Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. JIRA issues fixed (https://issues.jboss.org/): LOG-2075 - The elasticsearch-im-xxx job failed when trying to start index management process for a non-existent(empty-named) index 6. ========================================================================= Ubuntu Security Notice USN-5222-1 January 11, 2022 apache-log4j2 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.10 - Ubuntu 21.04 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in Apache Log4j 2. Software Description: - apache-log4j2: Apache Log4j - Logging Framework for Java Details: It was discovered that Apache Log4j 2 was vulnerable to remote code execution (RCE) attack when configured to use a JDBC Appender with a JNDI LDAP data source URI. This issue only affected Ubuntu 18.04 LTS. (CVE-2021-45105) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.10: liblog4j2-java 2.17.1-0.21.10.1 Ubuntu 21.04: liblog4j2-java 2.17.1-0.21.04.1 Ubuntu 20.04 LTS: liblog4j2-java 2.17.1-0.20.04.1 Ubuntu 18.04 LTS: liblog4j2-java 2.12.4-0ubuntu0.1 In general, a standard system update will make all the necessary changes. For the oldstable distribution (buster), this problem has been fixed in version 2.17.0-1~deb10u1. For the stable distribution (bullseye), this problem has been fixed in version 2.17.0-1~deb11u1. We recommend that you upgrade your apache-log4j2 packages. For the detailed security status of apache-log4j2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/apache-log4j2 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmG+Ro1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQVuBAArOperYABsLeaPcs3DgNxHcDDUNGCcvo5fsBtkh+MDvHMspqOb8VqLShx BtzPJGE0UTdBrfAqWeuMCbV1LdBYfwRUlrUyZiQXBiEx5BI5vDB4vaDUtAomwC6o vnbJwDlvlpoSwbURcls/Z0Hs15gwHX2D/lSa+j+NSxaNCkEOqvjr8dbpnHMSIbwz f0hSWQm4jydadUHP/zXSwN+LeZrJs+uP1tIdajtZjr6VoPkV48EDxCctaVttn27q 9DrGM9RjKGyCCKB/WrWToRbv/Mke20AJ4SOWoDdy1u/m2wcgW3pv1cap7J3RRjYO K5V5qacdJDo9FWoRkb1ftXlanyVe5DyI+j/9un+uZLSlOkeTha+hP+Tj2P/sx/Z4 xbpmPRGJ+O/BuxoPXUJNSTkh7vLu0CJkCfzi3Gj24c22jkBV3POJ7iZsFvNbJHAi 3i6VBc7e6tcqdiIhZqj/+odu2rCqeYqMbvhLL/slnQQVU4YMn3F1FtPWEpfAmQzP YCg2vLei5rTt3dYjA5aBluJPEPXO5rA5nZa3xq5hbzAJMl/m1yU9K6v73mCk9gnK yFHoaD+Ls97tPCMiO/56kIQecLv5s7GuuwLQlC8rm9TgXzl/m6rqst7a93IcsnV9 P+f2RZsciOyXo1N4zhakNkZ4dkmRZCfm9xCfeqAKUQgqVPXhBtE= =Wkr6 -----END PGP SIGNATURE-----

Trust: 2.43

sources: NVD: CVE-2021-45105 // ZDI: ZDI-21-1541 // VULHUB: VHN-408743 // PACKETSTORM: 165632 // PACKETSTORM: 165636 // PACKETSTORM: 165637 // PACKETSTORM: 165648 // PACKETSTORM: 165649 // PACKETSTORM: 166798 // PACKETSTORM: 165503 // PACKETSTORM: 165516 // PACKETSTORM: 169176

AFFECTED PRODUCTS

vendor:oraclemodel:retail order brokerscope:eqversion:16.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.1.3

Trust: 1.0

vendor:oraclemodel:e-business suitescope:eqversion:12.2

Trust: 1.0

vendor:oraclemodel:insurance insbridge rating and underwritingscope:eqversion:5.2.0

Trust: 1.0

vendor:oraclemodel:flexcube universal bankingscope:eqversion:14.5

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:18.8.0

Trust: 1.0

vendor:sonicwallmodel:network security managerscope:gteversion:2.0

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:19.1

Trust: 1.0

vendor:oraclemodel:banking enterprise default managementscope:eqversion:2.12.0

Trust: 1.0

vendor:oraclemodel:communications cloud native core network repository functionscope:eqversion:1.15.1

Trust: 1.0

vendor:sonicwallmodel:web application firewallscope:ltversion:3.1.0

Trust: 1.0

vendor:oraclemodel:webcenter sitesscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.12.3

Trust: 1.0

vendor:oraclemodel:communications interactive session recorderscope:eqversion:6.4

Trust: 1.0

vendor:sonicwallmodel:email securityscope:lteversion:10.0.12

Trust: 1.0

vendor:oraclemodel:retail store inventory managementscope:eqversion:15.0.3.8

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:lteversion:8.5.1.0

Trust: 1.0

vendor:oraclemodel:hyperion infrastructure technologyscope:ltversion:11.2.8.0

Trust: 1.0

vendor:oraclemodel:retail store inventory managementscope:eqversion:16.0.3.7

Trust: 1.0

vendor:oraclemodel:agile engineering data managementscope:eqversion:6.2.1.0

Trust: 1.0

vendor:oraclemodel:flexcube universal bankingscope:lteversion:12.4

Trust: 1.0

vendor:oraclemodel:health sciences empirica signalscope:eqversion:9.2.0.0

Trust: 1.0

vendor:oraclemodel:retail financial integrationscope:eqversion:15.0.3.1

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:19.12

Trust: 1.0

vendor:oraclemodel:retail order management systemscope:eqversion:19.5

Trust: 1.0

vendor:oraclemodel:insurance insbridge rating and underwritingscope:eqversion:5.6.1.0

Trust: 1.0

vendor:oraclemodel:communications service brokerscope:eqversion:6.2

Trust: 1.0

vendor:oraclemodel:banking treasury managementscope:eqversion:14.5

Trust: 1.0

vendor:oraclemodel:sql developerscope:ltversion:21.4.2

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:18.8

Trust: 1.0

vendor:oraclemodel:utilities frameworkscope:lteversion:4.3.0.6.0

Trust: 1.0

vendor:oraclemodel:management cloud enginescope:eqversion:1.5.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:18.8.13

Trust: 1.0

vendor:oraclemodel:retail data extractor for merchandisingscope:eqversion:15.0.2

Trust: 1.0

vendor:oraclemodel:retail data extractor for merchandisingscope:eqversion:16.0.2

Trust: 1.0

vendor:oraclemodel:communications cloud native core consolescope:eqversion:1.9.0

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.13.0

Trust: 1.0

vendor:oraclemodel:instantis enterprisetrackscope:eqversion:17.3

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:21.12.0.0

Trust: 1.0

vendor:oraclemodel:healthcare foundationscope:lteversion:7.3.0.4

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:14.1.3

Trust: 1.0

vendor:oraclemodel:banking platformscope:eqversion:2.6.2

Trust: 1.0

vendor:oraclemodel:communications user data repositoryscope:eqversion:12.4

Trust: 1.0

vendor:oraclemodel:communications unified inventory managementscope:eqversion:7.3.5

Trust: 1.0

vendor:oraclemodel:financial services model management and governancescope:eqversion:8.1.1.0.0

Trust: 1.0

vendor:oraclemodel:flexcube universal bankingscope:gteversion:14.0.0

Trust: 1.0

vendor:oraclemodel:insurance insbridge rating and underwritingscope:gteversion:5.4

Trust: 1.0

vendor:oraclemodel:communications services gatekeeperscope:eqversion:7.0

Trust: 1.0

vendor:sonicwallmodel:6bk1602-0aa32-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:oraclemodel:health sciences empirica signalscope:eqversion:9.1.0.6

Trust: 1.0

vendor:oraclemodel:payment interfacescope:eqversion:20.3

Trust: 1.0

vendor:oraclemodel:retail integration busscope:gteversion:19.0.0

Trust: 1.0

vendor:oraclemodel:communications element managerscope:ltversion:9.0

Trust: 1.0

vendor:oraclemodel:agile plm mcad connectorscope:eqversion:3.6

Trust: 1.0

vendor:oraclemodel:retail invoice matchingscope:eqversion:16.0.3

Trust: 1.0

vendor:oraclemodel:health sciences informscope:eqversion:7.0.0.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:eqversion:21.12.0

Trust: 1.0

vendor:oraclemodel:enterprise manager for peoplesoftscope:eqversion:13.4.1.1

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:14.1.3.46

Trust: 1.0

vendor:oraclemodel:communications cloud native core unified data repositoryscope:eqversion:1.15.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.3.1

Trust: 1.0

vendor:oraclemodel:insurance data gatewayscope:eqversion:1.0.1

Trust: 1.0

vendor:oraclemodel:communications ip service activatorscope:eqversion:7.4.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:20.12.7

Trust: 1.0

vendor:oraclemodel:retail eftlinkscope:eqversion:20.0.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:15.0.3.1

Trust: 1.0

vendor:oraclemodel:retail merchandising systemscope:eqversion:19.0.1

Trust: 1.0

vendor:oraclemodel:retail financial integrationscope:eqversion:19.0.0

Trust: 1.0

vendor:oraclemodel:retail store inventory managementscope:eqversion:14.1.3.14

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:gteversion:8.3.0.0

Trust: 1.0

vendor:oraclemodel:communications evolved communications application serverscope:eqversion:7.1

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:19.12.0

Trust: 1.0

vendor:oraclemodel:retail price managementscope:eqversion:13.2

Trust: 1.0

vendor:oraclemodel:retail price managementscope:eqversion:14.1.3.0

Trust: 1.0

vendor:oraclemodel:communications cloud native core service communication proxyscope:eqversion:1.15.0

Trust: 1.0

vendor:oraclemodel:communications cloud native core security edge protection proxyscope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:retail store inventory managementscope:eqversion:14.1.3.5

Trust: 1.0

vendor:oraclemodel:communications pricing design centerscope:eqversion:12.0.0.4

Trust: 1.0

vendor:oraclemodel:siebel ui frameworkscope:lteversion:21.12

Trust: 1.0

vendor:oraclemodel:retail eftlinkscope:eqversion:21.0.0

Trust: 1.0

vendor:oraclemodel:flexcube universal bankingscope:eqversion:11.83.3

Trust: 1.0

vendor:oraclemodel:payment interfacescope:eqversion:19.1

Trust: 1.0

vendor:oraclemodel:retail merchandising systemscope:eqversion:16.0.3

Trust: 1.0

vendor:oraclemodel:communications convergent charging controllerscope:gteversion:12.0.1.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:retail point-of-servicescope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:health sciences information managerscope:gteversion:3.0.1

Trust: 1.0

vendor:apachemodel:log4jscope:lteversion:2.16.0

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:lteversion:19.12.18.0

Trust: 1.0

vendor:oraclemodel:healthcare translational researchscope:eqversion:4.1.0

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:gteversion:20.12.0.0

Trust: 1.0

vendor:oraclemodel:utilities frameworkscope:gteversion:4.3.0.1.0

Trust: 1.0

vendor:oraclemodel:utilities frameworkscope:eqversion:4.4.0.2.0

Trust: 1.0

vendor:oraclemodel:webcenter portalscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:managed file transferscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.58

Trust: 1.0

vendor:oraclemodel:autovue for agile product lifecycle managementscope:eqversion:21.0.2

Trust: 1.0

vendor:oraclemodel:communications cloud native core network function cloud native environmentscope:eqversion:1.10.0

Trust: 1.0

vendor:oraclemodel:hyperion planningscope:ltversion:11.2.8.0

Trust: 1.0

vendor:oraclemodel:banking platformscope:eqversion:2.7.1

Trust: 1.0

vendor:oraclemodel:retail eftlinkscope:eqversion:17.0.2

Trust: 1.0

vendor:oraclemodel:business intelligencescope:eqversion:5.5.0.0.0

Trust: 1.0

vendor:oraclemodel:data integratorscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:15.0.3.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:19.0.1

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.4

Trust: 1.0

vendor:oraclemodel:flexcube universal bankingscope:lteversion:14.3.0

Trust: 1.0

vendor:oraclemodel:communications network charging and controlscope:eqversion:6.0.1.0.0

Trust: 1.0

vendor:oraclemodel:communications cloud native core policyscope:eqversion:1.15.0

Trust: 1.0

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.59

Trust: 1.0

vendor:oraclemodel:communications session report managerscope:ltversion:9.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:19.0.0

Trust: 1.0

vendor:oraclemodel:enterprise manager for peoplesoftscope:eqversion:13.5.1.1

Trust: 1.0

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.2.1

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:20.12.0

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:lteversion:20.12.12.0

Trust: 1.0

vendor:oraclemodel:financial services analytical applications infrastructurescope:gteversion:8.0.7

Trust: 1.0

vendor:oraclemodel:retail financial integrationscope:lteversion:16.0.3

Trust: 1.0

vendor:oraclemodel:identity manager connectorscope:eqversion:9.1.0

Trust: 1.0

vendor:oraclemodel:retail financial integrationscope:gteversion:16.0.1

Trust: 1.0

vendor:oraclemodel:insurance insbridge rating and underwritingscope:lteversion:5.6.0.0

Trust: 1.0

vendor:oraclemodel:identity management suitescope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:retail financial integrationscope:eqversion:14.1.3.2

Trust: 1.0

vendor:oraclemodel:hyperion profitability and cost managementscope:ltversion:11.2.8.0

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:gteversion:16.0.1

Trust: 1.0

vendor:oraclemodel:communications webrtc session controllerscope:eqversion:7.2.0.0

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:15.0.3.115

Trust: 1.0

vendor:oraclemodel:retail price managementscope:eqversion:15.0.3.0

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:16.0.3.240

Trust: 1.0

vendor:oraclemodel:instantis enterprisetrackscope:eqversion:17.1

Trust: 1.0

vendor:oraclemodel:banking deposits and lines of credit servicingscope:eqversion:2.12.0

Trust: 1.0

vendor:oraclemodel:communications pricing design centerscope:eqversion:12.0.0.5

Trust: 1.0

vendor:oraclemodel:retail price managementscope:eqversion:14.0.4

Trust: 1.0

vendor:oraclemodel:banking paymentsscope:eqversion:14.5

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:17.12.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:gteversion:16.0.1

Trust: 1.0

vendor:oraclemodel:utilities frameworkscope:eqversion:4.4.0.3.0

Trust: 1.0

vendor:oraclemodel:retail customer insightsscope:eqversion:15.0.2

Trust: 1.0

vendor:oraclemodel:communications session route managerscope:ltversion:9.0

Trust: 1.0

vendor:oraclemodel:banking enterprise default managementscope:eqversion:2.7.1

Trust: 1.0

vendor:oraclemodel:health sciences information managerscope:lteversion:3.0.4

Trust: 1.0

vendor:netappmodel:cloud managerscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:webcenter sitesscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:health sciences informscope:eqversion:6.2.1.1

Trust: 1.0

vendor:oraclemodel:jdeveloperscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:19.0.1

Trust: 1.0

vendor:oraclemodel:retail integration busscope:lteversion:16.0.3

Trust: 1.0

vendor:oraclemodel:utilities frameworkscope:eqversion:4.4.0.0.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:eqversion:14.1.3.2

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:18.0

Trust: 1.0

vendor:oraclemodel:hospitality token proxy servicescope:eqversion:19.2

Trust: 1.0

vendor:oraclemodel:retail price managementscope:eqversion:16.0.3.0

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:21.12

Trust: 1.0

vendor:oraclemodel:instantis enterprisetrackscope:eqversion:17.2

Trust: 1.0

vendor:oraclemodel:healthcare master person indexscope:eqversion:5.0.1

Trust: 1.0

vendor:oraclemodel:communications asapscope:eqversion:7.3

Trust: 1.0

vendor:oraclemodel:retail eftlinkscope:eqversion:18.0.1

Trust: 1.0

vendor:oraclemodel:communications convergencescope:eqversion:3.0.3.0

Trust: 1.0

vendor:oraclemodel:agile plmscope:eqversion:9.3.6

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:oraclemodel:banking party managementscope:eqversion:2.7.0

Trust: 1.0

vendor:oraclemodel:communications convergent charging controllerscope:eqversion:6.0.1.0.0

Trust: 1.0

vendor:oraclemodel:communications network charging and controlscope:lteversion:12.0.4.0.0

Trust: 1.0

vendor:oraclemodel:communications unified inventory managementscope:eqversion:7.4.1

Trust: 1.0

vendor:sonicwallmodel:6bk1602-0aa42-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:oraclemodel:hyperion bi\+scope:ltversion:11.2.8.0

Trust: 1.0

vendor:oraclemodel:communications cloud native core network repository functionscope:eqversion:1.15.0

Trust: 1.0

vendor:oraclemodel:retail integration busscope:lteversion:19.0.1.0

Trust: 1.0

vendor:oraclemodel:health sciences informscope:eqversion:6.3.2.1

Trust: 1.0

vendor:oraclemodel:communications billing and revenue managementscope:eqversion:12.0.0.4

Trust: 1.0

vendor:oraclemodel:communications eagle element management systemscope:eqversion:46.6

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:lteversion:16.0.3

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:gteversion:19.12.0.0

Trust: 1.0

vendor:oraclemodel:communications convergent charging controllerscope:lteversion:12.0.4.0.0

Trust: 1.0

vendor:oraclemodel:banking trade financescope:eqversion:14.5

Trust: 1.0

vendor:oraclemodel:healthcare foundationscope:gteversion:7.3.0.1

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:14.1.3.2

Trust: 1.0

vendor:sonicwallmodel:web application firewallscope:gteversion:3.0.0

Trust: 1.0

vendor:oraclemodel:retail central officescope:eqversion:14.1

Trust: 1.0

vendor:sonicwallmodel:6bk1602-0aa12-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:oraclemodel:communications network charging and controlscope:gteversion:12.0.1.0.0

Trust: 1.0

vendor:sonicwallmodel:network security managerscope:ltversion:3.0

Trust: 1.0

vendor:oraclemodel:retail customer insightsscope:eqversion:16.0.2

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:19.0.1.0

Trust: 1.0

vendor:oraclemodel:retail back officescope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:healthcare translational researchscope:eqversion:4.1.1

Trust: 1.0

vendor:oraclemodel:retail store inventory managementscope:eqversion:14.0.4.13

Trust: 1.0

vendor:oraclemodel:flexcube universal bankingscope:gteversion:12.1.0

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.0

Trust: 1.0

vendor:oraclemodel:hospitality suite8scope:eqversion:8.13.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:17.12.11

Trust: 1.0

vendor:oraclemodel:retail eftlinkscope:eqversion:19.0.1

Trust: 1.0

vendor:oraclemodel:communications convergencescope:eqversion:3.0.2.2.0

Trust: 1.0

vendor:oraclemodel:retail invoice matchingscope:eqversion:15.0.3

Trust: 1.0

vendor:oraclemodel:webcenter portalscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:retail service backbonescope:eqversion:19.0.0

Trust: 1.0

vendor:oraclemodel:banking loans servicingscope:eqversion:2.12.0

Trust: 1.0

vendor:oraclemodel:hospitality suite8scope:eqversion:8.14.0

Trust: 1.0

vendor:oraclemodel:communications cloud native core network slice selection functionscope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:communications eagle ftp table base retrievalscope:eqversion:4.5

Trust: 1.0

vendor:oraclemodel:financial services analytical applications infrastructurescope:lteversion:8.1.1

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:eqversion:10.4.0.3

Trust: 1.0

vendor:oraclemodel:enterprise manager base platformscope:eqversion:13.4.0.0

Trust: 1.0

vendor:oraclemodel:hyperion data relationship managementscope:ltversion:11.2.8.0

Trust: 1.0

vendor:oraclemodel:financial services model management and governancescope:eqversion:8.0.8.0.0

Trust: 1.0

vendor:oraclemodel:healthcare data repositoryscope:eqversion:8.1.1

Trust: 1.0

vendor:oraclemodel:mysql enterprise monitorscope:lteversion:8.0.29

Trust: 1.0

vendor:oraclemodel:identity management suitescope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:retail store inventory managementscope:eqversion:15.0.3.3

Trust: 1.0

vendor:oraclemodel:retail eftlinkscope:eqversion:16.0.3

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:19.12.12

Trust: 1.0

vendor:oraclemodel:retail returns managementscope:eqversion:14.1

Trust: 1.0

vendor:oraclemodel:communications billing and revenue managementscope:eqversion:12.0.0.5

Trust: 1.0

vendor:sonicwallmodel:6bk1602-0aa52-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:oraclemodel:banking platformscope:eqversion:2.12.0

Trust: 1.0

vendor:oraclemodel:communications messaging serverscope:eqversion:8.1

Trust: 1.0

vendor:oraclemodel:communications unified inventory managementscope:eqversion:7.4.2

Trust: 1.0

vendor:oraclemodel:managed file transferscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:14.1.1.0.0

Trust: 1.0

vendor:oraclemodel:financial services model management and governancescope:eqversion:8.1.0.0.0

Trust: 1.0

vendor:oraclemodel:communications interactive session recorderscope:eqversion:6.3

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:20.12

Trust: 1.0

vendor:oraclemodel:data integratorscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.4.0.0

Trust: 1.0

vendor:oraclemodel:taleo platformscope:ltversion:22.1

Trust: 1.0

vendor:oraclemodel:communications network integrityscope:eqversion:7.3.6

Trust: 1.0

vendor:oraclemodel:retail financial integrationscope:eqversion:19.0.1

Trust: 1.0

vendor:oraclemodel:enterprise manager base platformscope:eqversion:13.5.0.0

Trust: 1.0

vendor:sonicwallmodel:6bk1602-0aa22-0tp0scope:ltversion:2.7.0

Trust: 1.0

vendor:oraclemodel:hyperion tax provisionscope:ltversion:11.2.8.0

Trust: 1.0

vendor:apachemodel:log4jscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-1541 // NVD: CVE-2021-45105

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45105
value: MEDIUM

Trust: 1.0

ZDI: CVE-2021-45105
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-202112-1493
value: MEDIUM

Trust: 0.6

VULHUB: VHN-408743
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45105
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-408743
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-45105
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 1.0

ZDI: CVE-2021-45105
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-1541 // VULHUB: VHN-408743 // CNNVD: CNNVD-202112-1493 // NVD: CVE-2021-45105

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-674

Trust: 1.1

sources: VULHUB: VHN-408743 // NVD: CVE-2021-45105

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 165516 // CNNVD: CNNVD-202112-1493

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202112-1493

PATCH

title:Apache has issued an update to correct this vulnerability.url:https://logging.apache.org/log4j/2.x/security.html

Trust: 0.7

title:Apache Log4j Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178594

Trust: 0.6

sources: ZDI: ZDI-21-1541 // CNNVD: CNNVD-202112-1493

EXTERNAL IDS

db:NVDid:CVE-2021-45105

Trust: 3.3

db:ZDIid:ZDI-21-1541

Trust: 2.4

db:CERT/CCid:VU#930724

Trust: 1.7

db:SIEMENSid:SSA-501673

Trust: 1.7

db:SIEMENSid:SSA-479842

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/19/1

Trust: 1.7

db:PACKETSTORMid:165516

Trust: 0.8

db:PACKETSTORMid:165648

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-16160

Trust: 0.7

db:PACKETSTORMid:165373

Trust: 0.7

db:PACKETSTORMid:165552

Trust: 0.7

db:PACKETSTORMid:165497

Trust: 0.7

db:PACKETSTORMid:165645

Trust: 0.7

db:PACKETSTORMid:166798

Trust: 0.7

db:CS-HELPid:SB2022072076

Trust: 0.6

db:CS-HELPid:SB2022032006

Trust: 0.6

db:CS-HELPid:SB2022042115

Trust: 0.6

db:CS-HELPid:SB2021122913

Trust: 0.6

db:CS-HELPid:SB2022022126

Trust: 0.6

db:CS-HELPid:SB2022062006

Trust: 0.6

db:CS-HELPid:SB2022011734

Trust: 0.6

db:CS-HELPid:SB2022012334

Trust: 0.6

db:CS-HELPid:SB2022010325

Trust: 0.6

db:CS-HELPid:SB2021122308

Trust: 0.6

db:CS-HELPid:SB2022010517

Trust: 0.6

db:CS-HELPid:SB2022021429

Trust: 0.6

db:CS-HELPid:SB2022030709

Trust: 0.6

db:CS-HELPid:SB2021123016

Trust: 0.6

db:CS-HELPid:SB2021121903

Trust: 0.6

db:CS-HELPid:SB2022011838

Trust: 0.6

db:CS-HELPid:SB2021122726

Trust: 0.6

db:CS-HELPid:SB2022010632

Trust: 0.6

db:CS-HELPid:SB2022072504

Trust: 0.6

db:CS-HELPid:SB2022011042

Trust: 0.6

db:CS-HELPid:SB2022012045

Trust: 0.6

db:CS-HELPid:SB2022010421

Trust: 0.6

db:CS-HELPid:SB2022012443

Trust: 0.6

db:CS-HELPid:SB2021122814

Trust: 0.6

db:CS-HELPid:SB2022012501

Trust: 0.6

db:CS-HELPid:SB2022020608

Trust: 0.6

db:CS-HELPid:SB2022011226

Trust: 0.6

db:CS-HELPid:SB2021122213

Trust: 0.6

db:CS-HELPid:SB2022012742

Trust: 0.6

db:CS-HELPid:SB2021122114

Trust: 0.6

db:CS-HELPid:SB2022060808

Trust: 0.6

db:CS-HELPid:SB2022032405

Trust: 0.6

db:CS-HELPid:SB2022060712

Trust: 0.6

db:CS-HELPid:SB2021122019

Trust: 0.6

db:PACKETSTORMid:166677

Trust: 0.6

db:AUSCERTid:ESB-2022.0199

Trust: 0.6

db:AUSCERTid:ESB-2022.0125

Trust: 0.6

db:AUSCERTid:ESB-2022.0044.2

Trust: 0.6

db:AUSCERTid:ESB-2022.0086

Trust: 0.6

db:AUSCERTid:ESB-2022.0045

Trust: 0.6

db:AUSCERTid:ESB-2022.0240

Trust: 0.6

db:AUSCERTid:ESB-2022.0247

Trust: 0.6

db:AUSCERTid:ESB-2021.4187.6

Trust: 0.6

db:AUSCERTid:ESB-2022.0332

Trust: 0.6

db:AUSCERTid:ESB-2021.4302.3

Trust: 0.6

db:AUSCERTid:ESB-2022.0038

Trust: 0.6

db:AUSCERTid:ESB-2021.4313

Trust: 0.6

db:AUSCERTid:ESB-2022.0175

Trust: 0.6

db:AUSCERTid:ESB-2022.0091

Trust: 0.6

db:LENOVOid:LEN-76573

Trust: 0.6

db:CNNVDid:CNNVD-202112-1493

Trust: 0.6

db:PACKETSTORMid:165637

Trust: 0.2

db:PACKETSTORMid:165503

Trust: 0.2

db:PACKETSTORMid:165649

Trust: 0.2

db:PACKETSTORMid:165636

Trust: 0.2

db:PACKETSTORMid:165632

Trust: 0.2

db:PACKETSTORMid:165499

Trust: 0.1

db:PACKETSTORMid:165494

Trust: 0.1

db:PACKETSTORMid:165650

Trust: 0.1

db:CNVDid:CNVD-2021-101661

Trust: 0.1

db:VULHUBid:VHN-408743

Trust: 0.1

db:PACKETSTORMid:169176

Trust: 0.1

sources: ZDI: ZDI-21-1541 // VULHUB: VHN-408743 // PACKETSTORM: 165632 // PACKETSTORM: 165636 // PACKETSTORM: 165637 // PACKETSTORM: 165648 // PACKETSTORM: 165649 // PACKETSTORM: 166798 // PACKETSTORM: 165503 // PACKETSTORM: 165516 // PACKETSTORM: 169176 // CNNVD: CNNVD-202112-1493 // NVD: CVE-2021-45105

REFERENCES

url:https://logging.apache.org/log4j/2.x/security.html

Trust: 2.4

url:https://www.zerodayinitiative.com/advisories/zdi-21-1541/

Trust: 2.3

url:https://www.kb.cert.org/vuls/id/930724

Trust: 1.7

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-apache-log4j-qruknebd

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf

Trust: 1.7

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2021-0032

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20211218-0001/

Trust: 1.7

url:https://www.debian.org/security/2021/dsa-5024

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/19/1

Trust: 1.7

url:https://access.redhat.com/security/cve/cve-2021-45105

Trust: 1.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-45105

Trust: 0.9

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/eokpqgv24rrbbi4tbzudqmm4meh7mxcy/

Trust: 0.6

url:https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/sig7fzulmnk2xf6fzru4vwydqxnmugaj/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0125

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0045

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060808

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072076

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0086

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0240

Trust: 0.6

url:https://vigilance.fr/vulnerability/apache-log4j-overload-via-lookup-evaluation-infinite-recursion-37103

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011838

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4302.3

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122213

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122814

Trust: 0.6

url:https://packetstormsecurity.com/files/165645/red-hat-security-advisory-2022-0205-02.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011042

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010632

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122019

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0038

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012334

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072504

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0199

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022030709

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010517

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012742

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012501

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062006

Trust: 0.6

url:https://packetstormsecurity.com/files/165552/red-hat-security-advisory-2022-0026-06.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021123016

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011734

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122726

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010325

Trust: 0.6

url:https://packetstormsecurity.com/files/165516/ubuntu-security-notice-usn-5222-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022020608

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011226

Trust: 0.6

url:https://packetstormsecurity.com/files/165373/ubuntu-security-notice-usn-5203-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122114

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122913

Trust: 0.6

url:https://packetstormsecurity.com/files/165648/red-hat-security-advisory-2022-0219-03.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032405

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021121903

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032006

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0332

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0175

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042115

Trust: 0.6

url:https://packetstormsecurity.com/files/166798/red-hat-security-advisory-2022-1469-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0044.2

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0091

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060712

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022022126

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4313

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022021429

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4187.6

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122308

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-76573

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012045

Trust: 0.6

url:https://packetstormsecurity.com/files/166677/red-hat-security-advisory-2022-1296-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012443

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010421

Trust: 0.6

url:https://packetstormsecurity.com/files/165497/red-hat-security-advisory-2022-0043-03.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0247

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-44832

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-45046

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-45046

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-44832

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-009

Trust: 0.2

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.09.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.10.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44228

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44228

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0203

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.08.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=appplatform&version=7.4

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0216

Trust: 0.1

url:https://access.redhat.com/solutions/6577421

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0083

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product\xcatrhoar.eclipse.vertx&version=4.1.8

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.1/html/release_notes_for_eclipse_vert.x_4.1/index

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.amq.streams&version=1.6.6

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38153

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0219

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38153

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q1

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0222

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=red.hat.integration&version

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/html/release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1469

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.rhsso&downloadtype=patches&version=7.5

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20321

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-42574

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3712

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20321

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0047

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache-log4j2/2.17.1-0.20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache-log4j2/2.17.1-0.21.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache-log4j2/2.12.4-0ubuntu0.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5222-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/apache-log4j2/2.17.1-0.21.10.1

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/apache-log4j2

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

sources: ZDI: ZDI-21-1541 // VULHUB: VHN-408743 // PACKETSTORM: 165632 // PACKETSTORM: 165636 // PACKETSTORM: 165637 // PACKETSTORM: 165648 // PACKETSTORM: 165649 // PACKETSTORM: 166798 // PACKETSTORM: 165503 // PACKETSTORM: 165516 // PACKETSTORM: 169176 // CNNVD: CNNVD-202112-1493 // NVD: CVE-2021-45105

CREDITS

Guy Lederfein of Trend Micro Security Research

Trust: 1.3

sources: ZDI: ZDI-21-1541 // CNNVD: CNNVD-202112-1493

SOURCES

db:ZDIid:ZDI-21-1541
db:VULHUBid:VHN-408743
db:PACKETSTORMid:165632
db:PACKETSTORMid:165636
db:PACKETSTORMid:165637
db:PACKETSTORMid:165648
db:PACKETSTORMid:165649
db:PACKETSTORMid:166798
db:PACKETSTORMid:165503
db:PACKETSTORMid:165516
db:PACKETSTORMid:169176
db:CNNVDid:CNNVD-202112-1493
db:NVDid:CVE-2021-45105

LAST UPDATE DATE

2025-06-20T21:39:37.652000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-1541date:2021-12-19T00:00:00
db:VULHUBid:VHN-408743date:2022-10-06T00:00:00
db:CNNVDid:CNNVD-202112-1493date:2022-07-26T00:00:00
db:NVDid:CVE-2021-45105date:2024-11-21T06:31:58.170

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-1541date:2021-12-19T00:00:00
db:VULHUBid:VHN-408743date:2021-12-18T00:00:00
db:PACKETSTORMid:165632date:2022-01-20T17:49:05
db:PACKETSTORMid:165636date:2022-01-20T17:49:52
db:PACKETSTORMid:165637date:2022-01-20T17:50:03
db:PACKETSTORMid:165648date:2022-01-21T15:28:58
db:PACKETSTORMid:165649date:2022-01-21T15:29:08
db:PACKETSTORMid:166798date:2022-04-21T15:09:01
db:PACKETSTORMid:165503date:2022-01-10T18:01:18
db:PACKETSTORMid:165516date:2022-01-12T15:36:56
db:PACKETSTORMid:169176date:2021-12-28T20:12:00
db:CNNVDid:CNNVD-202112-1493date:2021-12-18T00:00:00
db:NVDid:CVE-2021-45105date:2021-12-18T12:15:07.433