QID 354858
Date Published: 2023-04-06
QID 354858: Amazon Linux Security Advisory for log4j : ALAS-2023-1718
A flaw was found in the java logging library apache log4j in version 1.x.
Jmssink in log4j 1.x is vulnerable to deserialization of untrusted data.
This allows a remote attacker to execute code on the server if jmssink is deployed and has been configured to perform jndi requests. (
( CVE-2022-23302) a flaw was found in the java logging library apache log4j in version 1.x.
Jdbcappender in log4j 1.x is vulnerable to sql injection in untrusted data.
This allows a remote attacker to run sql statements in the database if the deployed application is configured to use jdbcappender with certain interpolation tokens. (
( CVE-2022-23305) a flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution.
This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run. (
( CVE-2022-23307)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS-2023-1718 -
alas.aws.amazon.com/ALAS-2023-1718.html
CVEs related to QID 354858
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS-2023-1718 | amazon linux |
|