Log4j 1.x - Remote Code Execution (CVE-2019-17571)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Log4jv 1.x logging library is affected by a Remote Code Execution vulnerability. The root cause of this vulnerability is that SocketServer class is vulnerable to an insecure deserialization of data which can lead to remote code execution when the server is listening to untrusted network traffic for log data. All the versions between 1.2.0 and 1.2.17 are affected.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade Log4j library to at least version 1.2.18 and apply security patches.
- References
https://nvd.nist.gov/vuln/detail/CVE-2019-17571
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2019-17571
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Dec 2019
- Published at
- Updated at
- Software Type
- Logging library
- Vendor
- Apache
- Product
- Log4j