CVE-2021-4104
Summary
| CVE | CVE-2021-4104 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-12-14 12:15:00 UTC |
| Updated | 2023-12-22 09:15:00 UTC |
| Description | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Restrict LDAP access via JNDI by rgoers · Pull Request #608 · apache/logging-log4j2 · GitHub |
MISC |
github.com |
|
| CVE-2021-4104 Apache Log4j Vulnerability in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
|
access.redhat.com |
|
| Security Advisory |
|
psirt.global.sonicwall.com |
|
| oss-security - CVE-2022-23302: Deserialization of untrusted data in JMSSink in
Apache Log4j 1.x |
MLIST |
www.openwall.com |
|
| Oracle Critical Patch Update Advisory - July 2022 |
N/A |
www.oracle.com |
|
| cve-website |
|
www.cve.org |
|
| Oracle Critical Patch Update Advisory - April 2022 |
|
www.oracle.com |
|
| Minecraft Server: Remote Code Execution (GLSA 202312-02) — Gentoo security |
|
security.gentoo.org |
|
| Oracle Critical Patch Update Advisory - January 2022 |
MISC |
www.oracle.com |
|
| Arduino: Remote Code Execution (GLSA 202312-04) — Gentoo security |
|
security.gentoo.org |
|
| IBM Spectrum Protect: Multiple Vulnerabilities (GLSA 202209-02) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| Ubiquiti UniFi: remote code execution via bundled log4j (GLSA 202310-16) — Gentoo security |
|
security.gentoo.org |
|
| VU#930724 - Apache Log4j allows insecure JNDI lookups |
CERT-VN |
www.kb.cert.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159573 Oracle Enterprise Linux Security Update for log4j (ELSA-2021-5206)
- 159603 Oracle Enterprise Linux Security Update for parfait:0.5 (ELSA-2022-0290)
- 159619 Oracle Enterprise Linux Security Update for log4j (ELSA-2022-9056)
- 179047 Debian Security Update for apache-log4j1.2 (DLA 2905-1)
- 179633 Debian Security Update for apache-log4j1.2 (CVE-2021-4104)
- 198633 Ubuntu Security Notification for Apache Log4j 1.2 Vulnerability (USN-5223-1)
- 20251 IBM DB2 Security Update for Log4j (6528678)
- 239973 Red Hat Update for log4j (RHSA-2021:5206)
- 239980 Red Hat Update for rh-maven36-log4j12 (RHSA-2021:5269)
- 240034 Red Hat Update for parfait:0.5 (RHSA-2022:0289)
- 240035 Red Hat Update for parfait:0.5 (RHSA-2022:0290)
- 240036 Red Hat Update for parfait:0.5 (RHSA-2022:0291)
- 240059 Red Hat Update for JBoss Enterprise Application Platform 7.4 (RHSA-2022:0436)
- 240060 Red Hat Update for JBoss Enterprise Application Platform 6.4 (RHSA-2022:0438)
- 240078 Red Hat Update for red hat jboss web server 3.1 service pack 14 (RHSA-2022:0524)
- 240209 Red Hat Update for JBoss Enterprise Application Platform 7.4.4 (RHSA-2022:1296)
- 240210 Red Hat Update for JBoss Enterprise Application Platform 7.4.4 (RHSA-2022:1297)
- 240452 Red Hat Update for parfait:0.5 (RHSA-2022:0294)
- 240508 Red Hat Update for JBoss Enterprise Application Platform 6.4.2 (RHSA-2022:5459)
- 240511 Red Hat Update for JBoss Enterprise Application Platform 6.4.2 (RHSA-2022:5460)
- 257136 CentOS Security Update for log4j (CESA-2021:5206)
- 353112 Amazon Linux Security Advisory for log4j : ALAS-2022-1562
- 353124 Amazon Linux Security Advisory for log4j : ALAS2-2022-1739
- 376187 Apache Log4j 1.2 Remote Code Execution Vulnerability
- 376415 IBM WebSphere Application Server Multiple Vulnerabilities (Log4Shell) (6526750)
- 376425 Oracle Hypertext Transfer Protocol Server (HTTP Server) Multiple Vulnerabilities (Log4Shell) (Doc_ID_2817011.1)
- 377147 Alibaba Cloud Linux Security Update for parfait:0.5 (ALINUX3-SA-2022:0006)
- 377225 Alibaba Cloud Linux Security Update for log4j (ALINUX2-SA-2021:0072)
- 671353 EulerOS Security Update for log4j (EulerOS-SA-2022-1276)
- 710616 Gentoo Linux IBM Spectrum Protect Multiple Vulnerabilities (GLSA 202209-02)
- 710775 Gentoo Linux Ubiquiti UniFi Remote Code Execution (RCE) via bundled log4j Vulnerability (GLSA 202310-16)
- 710804 Gentoo Linux Minecraft Server Remote Code Execution (RCE) Vulnerability (GLSA 202312-02)
- 710807 Gentoo Linux Arduino Remote Code Execution (RCE) Vulnerability (GLSA 202312-04)
- 730566 Atlassian Jira Server and Data Center Log4j Vulnerability (JRASERVER-73885)
- 751522 SUSE Enterprise Linux Security Update for log4j (SUSE-SU-2021:4111-1)
- 751523 SUSE Enterprise Linux Security Update for log4j (SUSE-SU-2021:4115-1)
- 751524 OpenSUSE Security Update for log4j12 (openSUSE-SU-2021:4112-1)
- 751525 OpenSUSE Security Update for log4j (openSUSE-SU-2021:4111-1)
- 751556 OpenSUSE Security Update for log4j12 (openSUSE-SU-2021:1612-1)
- 87483 Oracle WebLogic Server Multiple Vulnerabilities (Log4Shell) (Doc_ID_2817011.1)
- 940440 AlmaLinux Security Update for parfait:0.5 (ALSA-2022:0290)
- 960689 Rocky Linux Security Update for parfait:0.5 (RLSA-2022:0290)