View all vulnerabilities

CVE-2019-17571

Deserialization of Untrusted Data in Log4j

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions 1.2 up to 1.2.17.Users are advised to migrate to `org.apache.logging.log4j:log4j-core`.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
9.8
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Versions
log4j:log4j >= 1.2
Severity
Ecosystem
Publish Date
January 6, 2020
Modified Date
March 10, 2024