CVE-2021-42550
Published on: Not Yet Published
Last Modified on: 12/12/2022 09:13:00 PM UTC
Certain versions of Cloud Manager from Netapp contain the following vulnerability:
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
- CVE-2021-42550 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
QOS.ch - logback version < 1.2.9
- Affected Vendor/Software:
QOS.ch - logback version < 1.3.0-alpha11
CVSS3 Score: 6.6 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | HIGH | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 8.5 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
cert-portal.siemens.com application/pdf |
![]() | |
[LOGBACK-1591] Possibility of vulnerability - QOS.ch JIRA | jira.qos.ch text/html |
![]() |
Full Disclosure: Open-Xchange Security Advisory 2022-07-21 | seclists.org text/html |
![]() |
CVE-2021-42550 Logback Vulnerability in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
GitHub - cn-panda/logbackRceDemo: The project is a simple vulnerability Demo environment written by SpringBoot. Here, I deliberately wrote a vulnerability environment where there are arbitrary file uploads, and then use the `scan` attribute in the loghack configuration file to cooperate with the logback vulnerability to implement RCE. | github.com text/html |
![]() |
Open-Xchange App Suite 7.10.x Cross Site Scripting / Command Injection ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
Logback News | logback.qos.ch text/html |
![]() |
Related QID Numbers
- 240566 Red Hat Update for Satellite 6.11 Release (RHSA-2022:5498)
- 591301 Siemens SINEC NMS Arbitrary Code Execution Vulnerability (SSA-371761 V1.0.3)
- 753967 SUSE Enterprise Linux Security Update for maven and recommended update for antlr3, minlog, sbt, xmvn (SUSE-SU-2023:2097-1)
- 753968 SUSE Enterprise Linux Security Update for maven and recommended update for antlr3, minlog, sbt, xmvn (SUSE-SU-2023:2097-1)
- 960505 Rocky Linux Security Update for Satellite (RLSA-2022:5498)
Exploit/POC from Github
Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-20…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Netapp | Cloud Manager | - | All | All | All |
Application | Netapp | Service Level Manager | - | All | All | All |
Application | Netapp | Snap Creator Framework | - | All | All | All |
Application | Qos | Logback | 1.3.0 | alpha0 | All | All |
Application | Qos | Logback | 1.3.0 | alpha1 | All | All |
Application | Qos | Logback | 1.3.0 | alpha10 | All | All |
Application | Qos | Logback | 1.3.0 | alpha2 | All | All |
Application | Qos | Logback | 1.3.0 | alpha3 | All | All |
Application | Qos | Logback | 1.3.0 | alpha4 | All | All |
Application | Qos | Logback | 1.3.0 | alpha5 | All | All |
Application | Qos | Logback | 1.3.0 | alpha6 | All | All |
Application | Qos | Logback | 1.3.0 | alpha7 | All | All |
Application | Qos | Logback | 1.3.0 | alpha8 | All | All |
Application | Qos | Logback | 1.3.0 | alpha9 | All | All |
Application | Qos | Logback | All | All | All | All |
Application | Redhat | Satellite | 6.0 | All | All | All |
Application | Siemens | Sinec Nms | All | All | All | All |
- cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha0:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha1:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha10:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha2:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha3:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha4:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha5:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha6:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha7:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha8:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:1.3.0:alpha9:*:*:*:*:*:*:
- cpe:2.3:a:qos:logback:*:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-42550 : In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit conf… twitter.com/i/web/status/1… | 2021-12-16 18:25:35 |
![]() |
CVE-2021-42550 | 2021-12-16 19:38:33 |