ID

VAR-202112-2011


CVE

CVE-2021-44832


TITLE

Apache Log4j Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202112-2743

DESCRIPTION

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. Apache Log4j is a Java-based open source logging tool of the Apache Foundation. Apache Log4j2 2.0-beta7 to 2.17.0 versions have a security vulnerability, which stems from the lack of effective protection and filtering for JDBC Appender and JNDI in the software. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Installation instructions are available from the Fuse product documentation pages: Fuse 7.8: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/deploying_into_spring_boot/patch-red-hat-fuse-applications Fuse 7.9: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/deploying_into_spring_boot/patch-red-hat-fuse-applications Fuse 7.10: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/installing_on_apache_karaf/apply-hotfix-patch https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/deploying_into_spring_boot/patch-red-hat-fuse-applications 4. The References section of this erratum contains a download link for the update. You must be logged in to download the update. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat JBoss Enterprise Application Platform 7.4.4 security update Advisory ID: RHSA-2022:1297-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2022:1297 Issue date: 2022-04-11 CVE Names: CVE-2021-4104 CVE-2021-44832 CVE-2021-45046 CVE-2021-45105 CVE-2022-23302 CVE-2022-23305 CVE-2022-23307 ===================================================================== 1. Summary: A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.4 for RHEL 8 - noarch, x86_64 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.3 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.4 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) * log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) * log4j-core: remote code execution via JDBC Appender (CVE-2021-44832) * log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) (CVE-2021-45046) * log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern (CVE-2021-45105) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2031667 - CVE-2021-4104 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender 2032580 - CVE-2021-45046 log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) 2034067 - CVE-2021-45105 log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern 2035951 - CVE-2021-44832 log4j-core: remote code execution via JDBC Appender 2041949 - CVE-2022-23302 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink 2041959 - CVE-2022-23305 log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender 2041967 - CVE-2022-23307 log4j: Unsafe deserialization flaw in Chainsaw log viewer 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-22105 - (7.4.z) Upgrade from com.io7m.xom:xom 1.2.10 to xom:xom 1.3.7 JBEAP-22385 - (7.4.z) Upgrade ASM from 7.1 to 9.1 JBEAP-22731 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00032 to 2.16.0.redhat-00034 JBEAP-22738 - (7.4.z) Upgrade jbossws-cxf from 5.4.2.Final to 5.4.4.Final(Fix UsernameTokenElytronTestCase on SE 17) JBEAP-22819 - [GSS] (7.4.z) HAL-1762 - Aliases are removed from the credential store when passwords are updated from the admin console JBEAP-22839 - [GSS](7.4.z) Upgrade yasson from 1.0.9.redhat-00001 to 1.0.10.redhat-00001 JBEAP-22864 - (7.4.z) Upgrade HAL from 3.3.8.Final-redhat-00001 to 3.3.9.Final-redhat-00001 JBEAP-22900 - Tracker bug for the EAP 7.4.4 release for RHEL-8 JBEAP-22904 - (7.4.z) Upgrade Hibernate ORM from 5.3.24.Final-redhat-00001 to 5.3.25.Final-redhat-00002 JBEAP-22911 - (7.4.z) Upgrade OpenSSL from 2.1.3.Final-redhat-00001 to 2.2.0.Final-redhat-00001 JBEAP-22912 - (7.4.z) Upgrade OpenSSL Natives from 2.1.0.SP01-redhat-00001 to 2.2.0.Final-redhat-00001 JBEAP-22913 - (7.4.z) Upgrade WildFly Core from 15.0.6.Final-redhat-00003 to 15.0.7.Final-redhat-00001 JBEAP-22935 - (7.4.z) Upgrade jboss-vfs from 3.2.15.Final-redhat-00001 to 3.2.16.Final-redhat-00001 JBEAP-22945 - (7.4.z) Upgrade org.apache.logging.log4j from 2.14.0.redhat-00002 to 2.17.1.redhat-00001 JBEAP-22973 - (7.4.z) Upgrade Elytron from 1.15.9.Final-redhat-00001 to 1.15.11.Final-redhat-00002 JBEAP-23038 - (7.4.z) Upgrade galleon-plugins from 5.1.4.Final to 5.2.6.Final JBEAP-23040 - (7.4.z) Upgrade galleon-plugins in wildfly-core-eap from 5.1.4.Final to 5.2.6.Final JBEAP-23045 - (7.4.z) Upgrade Undertow from 2.2.13.SP2-redhat-00001 to 2.2.16.Final-redhat-0001 JBEAP-23101 - (7.4.z) Upgrade Infinispan from 11.0.12.Final to 11.0.15.Final JBEAP-23105 - (7.4.z) Upgrade Narayana from 5.11.3.Final-redhat-00001 to 5.11.4.Final-redhat-00001 JBEAP-23143 - (7.4.z) Upgrade from org.eclipse.jdt.core.compiler:ecj:4.6.1 to org.eclipse.jdt:ecj:3.26 JBEAP-23177 - (7.4.z) Upgrade XNIO from 3.8.5.SP1-redhat-00001 to 3.8.6.Final-redhat-00001 JBEAP-23323 - [GSS](7.4.z) WFLY-16112 - Batch JobOperatorService should look for only active job names to stop during suspend JBEAP-23373 - (7.4.z) Upgrade OpenSSL from 2.2.0.Final-redhat-00001 to 2.2.0.Final-redhat-00002 JBEAP-23374 - (7.4.z) Upgrade WildFly Core from 15.0.7.Final-redhat-00001 to 15.0.8.Final-redhat-00001 JBEAP-23375 - (7.4.z) Upgrade OpenSSL Natives from 2.2.0.Final-redhat-00001 to 2.2.0.Final-redhat-00002 7. Package List: Red Hat JBoss EAP 7.4 for RHEL 8: Source: eap7-activemq-artemis-2.16.0-7.redhat_00034.1.el8eap.src.rpm eap7-ecj-3.26.0-1.redhat_00002.1.el8eap.src.rpm eap7-hal-console-3.3.9-1.Final_redhat_00001.1.el8eap.src.rpm eap7-hibernate-5.3.25-1.Final_redhat_00002.1.el8eap.src.rpm eap7-infinispan-11.0.15-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jboss-server-migration-1.10.0-15.Final_redhat_00014.1.el8eap.src.rpm eap7-jboss-vfs-3.2.16-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jboss-xnio-base-3.8.6-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jbossws-cxf-5.4.4-1.Final_redhat_00001.1.el8eap.src.rpm eap7-log4j-2.17.1-1.redhat_00001.1.el8eap.src.rpm eap7-narayana-5.11.4-1.Final_redhat_00001.1.el8eap.src.rpm eap7-objectweb-asm-9.1.0-1.redhat_00002.1.el8eap.src.rpm eap7-undertow-2.2.16-1.Final_redhat_00001.1.el8eap.src.rpm eap7-wildfly-7.4.4-3.GA_redhat_00011.1.el8eap.src.rpm eap7-wildfly-elytron-1.15.11-1.Final_redhat_00002.1.el8eap.src.rpm eap7-wildfly-openssl-2.2.0-3.Final_redhat_00002.1.el8eap.src.rpm eap7-wildfly-openssl-el8-x86_64-2.2.0-2.Final_redhat_00002.1.el8eap.src.rpm eap7-xom-1.3.7-1.redhat_00001.1.el8eap.src.rpm eap7-yasson-1.0.10-1.redhat_00001.1.el8eap.src.rpm noarch: eap7-activemq-artemis-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-cli-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-commons-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-core-client-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-dto-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-hornetq-protocol-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-hqclient-protocol-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-jdbc-store-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-jms-client-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-jms-server-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-journal-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-ra-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-selector-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-server-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-service-extensions-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-activemq-artemis-tools-2.16.0-7.redhat_00034.1.el8eap.noarch.rpm eap7-ecj-3.26.0-1.redhat_00002.1.el8eap.noarch.rpm eap7-hal-console-3.3.9-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-5.3.25-1.Final_redhat_00002.1.el8eap.noarch.rpm eap7-hibernate-core-5.3.25-1.Final_redhat_00002.1.el8eap.noarch.rpm eap7-hibernate-entitymanager-5.3.25-1.Final_redhat_00002.1.el8eap.noarch.rpm eap7-hibernate-envers-5.3.25-1.Final_redhat_00002.1.el8eap.noarch.rpm eap7-hibernate-java8-5.3.25-1.Final_redhat_00002.1.el8eap.noarch.rpm eap7-infinispan-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-cachestore-jdbc-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-cachestore-remote-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-client-hotrod-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-commons-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-component-annotations-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-core-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-hibernate-cache-commons-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-hibernate-cache-spi-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-infinispan-hibernate-cache-v53-11.0.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-server-migration-1.10.0-15.Final_redhat_00014.1.el8eap.noarch.rpm eap7-jboss-server-migration-cli-1.10.0-15.Final_redhat_00014.1.el8eap.noarch.rpm eap7-jboss-server-migration-core-1.10.0-15.Final_redhat_00014.1.el8eap.noarch.rpm eap7-jboss-vfs-3.2.16-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-xnio-base-3.8.6-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jbossws-cxf-5.4.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-log4j-2.17.1-1.redhat_00001.1.el8eap.noarch.rpm eap7-narayana-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-compensations-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jbosstxbridge-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jbossxts-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jts-idlj-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jts-integration-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-api-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-bridge-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-integration-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-util-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-txframework-5.11.4-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-objectweb-asm-9.1.0-1.redhat_00002.1.el8eap.noarch.rpm eap7-undertow-2.2.16-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-7.4.4-3.GA_redhat_00011.1.el8eap.noarch.rpm eap7-wildfly-elytron-1.15.11-1.Final_redhat_00002.1.el8eap.noarch.rpm eap7-wildfly-elytron-tool-1.15.11-1.Final_redhat_00002.1.el8eap.noarch.rpm eap7-wildfly-javadocs-7.4.4-3.GA_redhat_00011.1.el8eap.noarch.rpm eap7-wildfly-modules-7.4.4-3.GA_redhat_00011.1.el8eap.noarch.rpm eap7-wildfly-openssl-2.2.0-3.Final_redhat_00002.1.el8eap.noarch.rpm eap7-wildfly-openssl-java-2.2.0-3.Final_redhat_00002.1.el8eap.noarch.rpm eap7-xom-1.3.7-1.redhat_00001.1.el8eap.noarch.rpm eap7-yasson-1.0.10-1.redhat_00001.1.el8eap.noarch.rpm x86_64: eap7-wildfly-openssl-el8-x86_64-2.2.0-2.Final_redhat_00002.1.el8eap.x86_64.rpm eap7-wildfly-openssl-el8-x86_64-debuginfo-2.2.0-2.Final_redhat_00002.1.el8eap.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2021-4104 https://access.redhat.com/security/cve/CVE-2021-44832 https://access.redhat.com/security/cve/CVE-2021-45046 https://access.redhat.com/security/cve/CVE-2021-45105 https://access.redhat.com/security/cve/CVE-2022-23302 https://access.redhat.com/security/cve/CVE-2022-23305 https://access.redhat.com/security/cve/CVE-2022-23307 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/ 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYlRUqtzjgjWX9erEAQhXfxAApQ6HkBUo8Tg+GWEosSpAx0AEsVPMojWK HU3uJRF8jp0KXqchc+KVlalBJAWHPBUDr4xBpsISqwr7T/9iYonKlo4ijA/68b2K khbFyt6o6i2dXrYygT5fcMtukSjN2T/hfCc2ZE2yiHTO3Ou4AALyZ2xCyYtfSpuZ rZLVvgCWrnak2msgkoNl0/sZxnjw6b+ZJczKkq3QqPVWOYlV/Qdl5NGy16i0rbEo P1rWXJrOUlEBctJEs756cqeIJesYKHZqqPx/kHaNyzdxDh99hKGZx7oturscAN6e sPfSSdyd5jsOcWD7UlHV9ukoPQxf1ouVBa0qkpL0wCoR3GFF6Pls1bMEFzUoz3/R IwagVxsr38duK3isv34l6IQ+RP0oSWN0rgPUu69tAlEV+YwLgA5JUOpz1i7FTmXt l3i5+wMlo9Xc/Hy+j7unW8Do7s/i0YuFVTuM6H9KEITuFjgFA2tB9CpzoAFzWLk0 U8zCL80Rwy1wiMydSrLjtg3YUPB6ibh2NJ02O7R+bNhJ8bN4yuDuWkDqy4VdPXGp zhed3dZmYAXD9/x+mnfghcbJZwigzGT9Qv78zYafB3f8K7cEVEDJK3aZMOkkh9ca dcaLs5WRv8ZTytFPv+KGKRJ/cc/UHAvh8zumMZdVMp1oty/k/OYWhgaEJMWGQDCe UnHI/WwB37w= =eCh2 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. All OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor 3. Solution: For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1985826 - The elasticsearch-im-xxx job failed when trying to start index management process for a non-existent(empty-named) index 2034412 - Elasticsearch rejects logs with resourceVersion larger than int32 2035951 - CVE-2021-44832 log4j-core: remote code execution via JDBC Appender 5

Trust: 1.8

sources: NVD: CVE-2021-44832 // VULHUB: VHN-408213 // VULMON: CVE-2021-44832 // PACKETSTORM: 165632 // PACKETSTORM: 165637 // PACKETSTORM: 166676 // PACKETSTORM: 166677 // PACKETSTORM: 165650 // PACKETSTORM: 166022 // PACKETSTORM: 166020 // PACKETSTORM: 165750

AFFECTED PRODUCTS

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:gteversion:19.12.0

Trust: 1.0

vendor:oraclemodel:retail assortment planningscope:eqversion:16.0.3

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:18.8.0

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:lteversion:20.12.12.0

Trust: 1.0

vendor:oraclemodel:flexcube private bankingscope:eqversion:12.1.0

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:18.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:18.8.13

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:lteversion:8.5.1.0

Trust: 1.0

vendor:oraclemodel:retail xstore point of servicescope:eqversion:19.0.2

Trust: 1.0

vendor:oraclemodel:communications brm - elastic charging enginescope:ltversion:12.0.0.4.6

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.4

Trust: 1.0

vendor:oraclemodel:retail xstore point of servicescope:eqversion:20.0.1

Trust: 1.0

vendor:oraclemodel:siebel ui frameworkscope:lteversion:21.12

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:retail order brokerscope:eqversion:19.1

Trust: 1.0

vendor:apachemodel:log4jscope:eqversion:2.0

Trust: 1.0

vendor:oraclemodel:health sciences data management workbenchscope:eqversion:3.0.0.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:19.12.0

Trust: 1.0

vendor:oraclemodel:communications offline mediation controllerscope:eqversion:12.0.0.5.0

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:21.12

Trust: 1.0

vendor:oraclemodel:communications brm - elastic charging enginescope:eqversion:12.0.0.5.0

Trust: 1.0

vendor:oraclemodel:communications interactive session recorderscope:eqversion:6.3

Trust: 1.0

vendor:oraclemodel:retail fiscal managementscope:eqversion:14.2

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:lteversion:12.2.24

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:gteversion:8.3.0.0

Trust: 1.0

vendor:oraclemodel:retail xstore point of servicescope:eqversion:21.0.1

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:14.1.1.0.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.3.2

Trust: 1.0

vendor:oraclemodel:communications interactive session recorderscope:eqversion:6.4

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:oraclemodel:health sciences data management workbenchscope:eqversion:3.1.0.3

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:gteversion:19.12.0.0

Trust: 1.0

vendor:oraclemodel:product lifecycle analyticsscope:eqversion:3.6.1

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:19.12.12

Trust: 1.0

vendor:oraclemodel:policy automation for mobile devicesscope:gteversion:12.2.0

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:eqversion:21.12.0.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:17.12.11

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:20.12

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:gteversion:8.0.0.0

Trust: 1.0

vendor:oraclemodel:communications offline mediation controllerscope:ltversion:12.0.0.4.4

Trust: 1.0

vendor:oraclemodel:retail xstore point of servicescope:eqversion:18.0.3

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:17.12.0

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:gteversion:20.12.0.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:eqversion:21.12.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:oraclemodel:siebel ui frameworkscope:eqversion:21.12

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.0.1

Trust: 1.0

vendor:apachemodel:log4jscope:gteversion:2.13.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.17.1

Trust: 1.0

vendor:oraclemodel:policy automationscope:lteversion:12.2.24

Trust: 1.0

vendor:oraclemodel:health sciences data management workbenchscope:eqversion:2.5.2.1

Trust: 1.0

vendor:oraclemodel:policy automationscope:gteversion:12.2.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:lteversion:20.12.7

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:oraclemodel:primavera gatewayscope:gteversion:20.12.0

Trust: 1.0

vendor:apachemodel:log4jscope:ltversion:2.12.4

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:18.8

Trust: 1.0

vendor:oraclemodel:primavera unifierscope:eqversion:19.12

Trust: 1.0

vendor:ciscomodel:cloudcenterscope:eqversion:4.10.0.16

Trust: 1.0

vendor:oraclemodel:retail xstore point of servicescope:eqversion:17.0.4

Trust: 1.0

vendor:oraclemodel:primavera p6 enterprise project portfolio managementscope:lteversion:19.12.18.0

Trust: 1.0

sources: NVD: CVE-2021-44832

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-44832
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202112-2743
value: MEDIUM

Trust: 0.6

VULHUB: VHN-408213
value: HIGH

Trust: 0.1

VULMON: CVE-2021-44832
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-44832
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-408213
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-44832
baseSeverity: MEDIUM
baseScore: 6.6
vectorString: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.7
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-408213 // VULMON: CVE-2021-44832 // CNNVD: CNNVD-202112-2743 // NVD: CVE-2021-44832

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-74

Trust: 1.0

sources: VULHUB: VHN-408213 // NVD: CVE-2021-44832

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 166676 // PACKETSTORM: 166677 // CNNVD: CNNVD-202112-2743

TYPE

code execution

Trust: 0.6

sources: PACKETSTORM: 165632 // PACKETSTORM: 165637 // PACKETSTORM: 165650 // PACKETSTORM: 166022 // PACKETSTORM: 166020 // PACKETSTORM: 165750

PATCH

title:Apache Log4j Repair measures for injecting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=178606

Trust: 0.6

title:Debian CVElist Bug Report Logs: apache-log4j2: CVE-2021-44832: remote code execution via JDBC Appenderurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=5e48a524651ae46e6ca9ac28bf933dcd

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6.54 extras and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220181 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat AMQ Streams 1.6.7 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220467 - Security Advisory

Trust: 0.1

title:Red Hat: Low: Red Hat JBoss Enterprise Application Platform 7.4.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221297 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1734url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1734

Trust: 0.1

title:Red Hat: Low: Red Hat JBoss Enterprise Application Platform 7.4.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221296 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2021-44832url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-44832

Trust: 0.1

title:IBM: Security Bulletin: IBM Operations Analytics Predictive Insights impacted by Apache Log4j vulnerabilities (CVE-2021-44832)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=fcd7c03d55043b4b7009ca8b920eb0ba

Trust: 0.1

title:Red Hat: Low: Red Hat JBoss Enterprise Application Platform 7.4.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221299 - Security Advisory

Trust: 0.1

title:IBM: Security Bulletin: Vulnerabilities from log4j-core-2.16.0.jar affect IBM Operations Analytics – Log Analysis (CVE-2021-44832, CVE-2021-45105)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=56eb883672063a8cb42fae9e94dc10a9

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.7.43 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220493 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.8.31 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220485 - Security Advisory

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-011url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-011

Trust: 0.1

title:IBM: Security Bulletin: A vulnerability in Apache Log4j affects some features of IBM® Db2® (CVE-2021-44832)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=e5bceef16eb57f063a2b356f344b5f60

Trust: 0.1

title:IBM: Security Bulletin: Due to use of Apache Log4j, IBM QRadar SIEM is vulnerable to arbitrary code execution (CVE-2019-17571, CVE-2021-44832, CVE-2021-4104)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=a0cbd5f5df3a9f322684d99eeb2b9429

Trust: 0.1

title:IBM: Security Bulletin: Multiple vulnerabilities in Apache Log4j affects some features of IBM® Db2® (CVE-2021-45046, CVE-2021-45105)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=073d7506d5d6ad6fb03dbf8d511bb92e

Trust: 0.1

title:IBM: Security Bulletin: Vulnerability in Apache Log4j affects some features of IBM® Db2® (CVE-2021-44228)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=7be059b2ea8ddccc8012a9cd63f3f993

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=aff264acb8f6c42a7eec74ebc9aac61e

Trust: 0.1

title:Cisco: Vulnerabilities in Apache Log4j Library Affecting Cisco Products: December 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-apache-log4j-qRuKNEbd

Trust: 0.1

title:Citrix Security Bulletins: Citrix Security Advisory for CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 and CVE-2021-44832.url:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=f1a2b6f4f4568786daf1fc5e893e9283

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=42e3d15623cd7650d7ccb17534ee39a8

Trust: 0.1

title:Amazon Linux 2022: ALAS-2022-225url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS-2022-225

Trust: 0.1

title:aws-msk-iam-authurl:https://github.com/aws/aws-msk-iam-auth

Trust: 0.1

title:FuelSDK-Javaurl:https://github.com/salesforce-marketingcloud/FuelSDK-Java

Trust: 0.1

title:mule-3.x-log4j-update-scripturl:https://github.com/yhorndt/mule-3.x-log4j-update-script

Trust: 0.1

title:fix_log4j2url:https://github.com/YunDingLab/fix_log4j2

Trust: 0.1

sources: VULMON: CVE-2021-44832 // CNNVD: CNNVD-202112-2743

EXTERNAL IDS

db:NVDid:CVE-2021-44832

Trust: 2.6

db:SIEMENSid:SSA-784507

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/12/28/1

Trust: 1.7

db:PACKETSTORMid:166022

Trust: 0.8

db:PACKETSTORMid:165750

Trust: 0.8

db:PACKETSTORMid:165516

Trust: 0.7

db:PACKETSTORMid:165652

Trust: 0.7

db:PACKETSTORMid:165927

Trust: 0.7

db:PACKETSTORMid:165659

Trust: 0.7

db:PACKETSTORMid:165564

Trust: 0.7

db:PACKETSTORMid:165645

Trust: 0.7

db:PACKETSTORMid:165711

Trust: 0.7

db:CNNVDid:CNNVD-202112-2743

Trust: 0.7

db:PACKETSTORMid:166676

Trust: 0.7

db:PACKETSTORMid:166677

Trust: 0.7

db:CS-HELPid:SB2022010712

Trust: 0.6

db:CS-HELPid:SB2022012327

Trust: 0.6

db:CS-HELPid:SB2022042551

Trust: 0.6

db:CS-HELPid:SB2021122816

Trust: 0.6

db:CS-HELPid:SB2022011042

Trust: 0.6

db:CS-HELPid:SB2022072092

Trust: 0.6

db:CS-HELPid:SB2022021635

Trust: 0.6

db:CS-HELPid:SB2022012441

Trust: 0.6

db:CS-HELPid:SB2022011223

Trust: 0.6

db:CS-HELPid:SB2022041951

Trust: 0.6

db:CS-HELPid:SB2022072040

Trust: 0.6

db:CS-HELPid:SB2022011837

Trust: 0.6

db:CS-HELPid:SB2022060307

Trust: 0.6

db:CS-HELPid:SB2022072504

Trust: 0.6

db:CS-HELPid:SB2022012046

Trust: 0.6

db:CS-HELPid:SB2022012516

Trust: 0.6

db:CS-HELPid:SB2022012745

Trust: 0.6

db:CS-HELPid:SB2022021423

Trust: 0.6

db:CS-HELPid:SB2022010632

Trust: 0.6

db:CS-HELPid:SB2022060906

Trust: 0.6

db:CS-HELPid:SB2021123002

Trust: 0.6

db:CS-HELPid:SB2022011719

Trust: 0.6

db:CS-HELPid:SB2022020605

Trust: 0.6

db:CS-HELPid:SB2022042211

Trust: 0.6

db:CS-HELPid:SB2022032405

Trust: 0.6

db:CS-HELPid:SB2022020907

Trust: 0.6

db:LENOVOid:LEN-76573

Trust: 0.6

db:AUSCERTid:ESB-2022.0332

Trust: 0.6

db:AUSCERTid:ESB-2022.0351

Trust: 0.6

db:AUSCERTid:ESB-2022.0125

Trust: 0.6

db:AUSCERTid:ESB-2022.0247

Trust: 0.6

db:AUSCERTid:ESB-2022.0037

Trust: 0.6

db:AUSCERTid:ESB-2022.0685

Trust: 0.6

db:AUSCERTid:ESB-2022.0308

Trust: 0.6

db:AUSCERTid:ESB-2022.0395

Trust: 0.6

db:AUSCERTid:ESB-2022.0045

Trust: 0.6

db:AUSCERTid:ESB-2022.0195

Trust: 0.6

db:AUSCERTid:ESB-2022.0044.2

Trust: 0.6

db:PACKETSTORMid:166020

Trust: 0.2

db:PACKETSTORMid:165637

Trust: 0.2

db:PACKETSTORMid:165650

Trust: 0.2

db:PACKETSTORMid:165632

Trust: 0.2

db:PACKETSTORMid:165653

Trust: 0.1

db:PACKETSTORMid:165651

Trust: 0.1

db:PACKETSTORMid:165649

Trust: 0.1

db:PACKETSTORMid:165636

Trust: 0.1

db:VULHUBid:VHN-408213

Trust: 0.1

db:VULMONid:CVE-2021-44832

Trust: 0.1

sources: VULHUB: VHN-408213 // VULMON: CVE-2021-44832 // PACKETSTORM: 165632 // PACKETSTORM: 165637 // PACKETSTORM: 166676 // PACKETSTORM: 166677 // PACKETSTORM: 165650 // PACKETSTORM: 166022 // PACKETSTORM: 166020 // PACKETSTORM: 165750 // CNNVD: CNNVD-202112-2743 // NVD: CVE-2021-44832

REFERENCES

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-apache-log4j-qruknebd

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20220104-0001/

Trust: 1.7

url:https://issues.apache.org/jira/browse/log4j2-3293

Trust: 1.7

url:https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/12/28/1

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-44832

Trust: 1.4

url:https://access.redhat.com/security/cve/cve-2021-44832

Trust: 1.4

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/evv25fxl4fu5x6x5bsl7rlq7t6f65mra/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t57mpjuw3ma6qgwzrtmchhmmpqnvkgfc/

Trust: 1.0

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.8

url:https://access.redhat.com/security/team/contact/

Trust: 0.8

url:https://bugzilla.redhat.com/):

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t57mpjuw3ma6qgwzrtmchhmmpqnvkgfc/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/evv25fxl4fu5x6x5bsl7rlq7t6f65mra/

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2022.0125

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0685

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0045

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011837

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb20220422119

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011719

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022020907

Trust: 0.6

url:https://packetstormsecurity.com/files/165645/red-hat-security-advisory-2022-0205-02.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122816

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010712

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011042

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010632

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072504

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0037

Trust: 0.6

url:https://packetstormsecurity.com/files/165750/red-hat-security-advisory-2022-0181-05.html

Trust: 0.6

url:https://packetstormsecurity.com/files/166676/red-hat-security-advisory-2022-1297-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/165564/red-hat-security-advisory-2022-0138-06.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0351

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0395

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0195

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072040

Trust: 0.6

url:https://packetstormsecurity.com/files/165927/red-hat-security-advisory-2022-0467-02.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012745

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb20220422115

Trust: 0.6

url:https://packetstormsecurity.com/files/165711/red-hat-security-advisory-2022-0236-04.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0308

Trust: 0.6

url:https://packetstormsecurity.com/files/165516/ubuntu-security-notice-usn-5222-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060906

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060307

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022021423

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022041951

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072092

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022020605

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012516

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021123002

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032405

Trust: 0.6

url:https://packetstormsecurity.com/files/165652/red-hat-security-advisory-2022-0225-02.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022011223

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0332

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042551

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0044.2

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022021635

Trust: 0.6

url:https://vigilance.fr/vulnerability/apache-log4j-code-execution-via-jdbc-appender-logging-configuration-file-37144

Trust: 0.6

url:https://packetstormsecurity.com/files/165659/red-hat-security-advisory-2022-0230-03.html

Trust: 0.6

url:https://packetstormsecurity.com/files/166022/red-hat-security-advisory-2022-0485-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012327

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012441

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-76573

Trust: 0.6

url:https://packetstormsecurity.com/files/166677/red-hat-security-advisory-2022-1296-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012046

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0247

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-45046

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-45105

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-45105

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-45046

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-23307

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-23302

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-23305

Trust: 0.2

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4104

Trust: 0.2

url:https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-23302

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-23305

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-23307

Trust: 0.2

url:https://issues.jboss.org/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4104

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21248

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3521

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21296

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21299

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21283

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21341

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21360

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21299

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21282

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21294

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21360

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21305

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21293

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21341

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21293

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21282

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21248

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21294

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21283

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21296

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21365

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21305

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21340

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21340

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21365

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.2

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-009

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.09.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.10.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/installing_on_apache_karaf/apply-hotfix-patch

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.9/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44228

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44228

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0203

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches&product=jboss.fuse&version=7.08.0

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.8/html/deploying_into_spring_boot/patch-red-hat-fuse-applications

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0083

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product\xcatrhoar.eclipse.vertx&version=4.1.8

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.1/html/release_notes_for_eclipse_vert.x_4.1/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1297

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1296

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q1

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=red.hat.integration&version

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0223

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:0484

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0485

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0493

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0492

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14866

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:0180

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14866

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36322

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:0181

Trust: 0.1

sources: VULHUB: VHN-408213 // PACKETSTORM: 165632 // PACKETSTORM: 165637 // PACKETSTORM: 166676 // PACKETSTORM: 166677 // PACKETSTORM: 165650 // PACKETSTORM: 166022 // PACKETSTORM: 166020 // PACKETSTORM: 165750 // CNNVD: CNNVD-202112-2743 // NVD: CVE-2021-44832

CREDITS

Red Hat

Trust: 0.8

sources: PACKETSTORM: 165632 // PACKETSTORM: 165637 // PACKETSTORM: 166676 // PACKETSTORM: 166677 // PACKETSTORM: 165650 // PACKETSTORM: 166022 // PACKETSTORM: 166020 // PACKETSTORM: 165750

SOURCES

db:VULHUBid:VHN-408213
db:VULMONid:CVE-2021-44832
db:PACKETSTORMid:165632
db:PACKETSTORMid:165637
db:PACKETSTORMid:166676
db:PACKETSTORMid:166677
db:PACKETSTORMid:165650
db:PACKETSTORMid:166022
db:PACKETSTORMid:166020
db:PACKETSTORMid:165750
db:CNNVDid:CNNVD-202112-2743
db:NVDid:CVE-2021-44832

LAST UPDATE DATE

2024-11-20T21:19:51.826000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-408213date:2022-08-09T00:00:00
db:VULMONid:CVE-2021-44832date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202112-2743date:2022-12-09T00:00:00
db:NVDid:CVE-2021-44832date:2023-11-07T03:39:43.957

SOURCES RELEASE DATE

db:VULHUBid:VHN-408213date:2021-12-28T00:00:00
db:VULMONid:CVE-2021-44832date:2021-12-28T00:00:00
db:PACKETSTORMid:165632date:2022-01-20T17:49:05
db:PACKETSTORMid:165637date:2022-01-20T17:50:03
db:PACKETSTORMid:166676date:2022-04-11T17:14:49
db:PACKETSTORMid:166677date:2022-04-11T17:15:55
db:PACKETSTORMid:165650date:2022-01-21T15:29:54
db:PACKETSTORMid:166022date:2022-02-17T16:56:10
db:PACKETSTORMid:166020date:2022-02-17T16:54:19
db:PACKETSTORMid:165750date:2022-01-27T14:47:51
db:CNNVDid:CNNVD-202112-2743date:2021-12-28T00:00:00
db:NVDid:CVE-2021-44832date:2021-12-28T20:15:08.400