Vulnerability CVE-2021-45046


Published: 2021-12-14

Description:
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

Type:

CWE-502

(Deserialization of Untrusted Data)

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Sonicwall -> Email security 
Siemens -> Solid edge wiring harness design 
Siemens -> Solid edge cam pro 
Siemens -> Capital 
Siemens -> Spectrum power 4 
Siemens -> Solid edge harness design 
Siemens -> Cosmos 
Siemens -> Spectrum power 7 
Siemens -> Teamcenter 
Siemens -> Desigo consumption control advanced reporting 
Siemens -> Teamcenter suite 
Siemens -> Captial 
Siemens -> Xpedition enterprise 
Siemens -> Desigo consumption control info center 
Siemens -> Vesys 
Siemens -> Comos 
Siemens -> E-car operating center 
Siemens -> Xpedition enterprise data management 
Siemens -> Desigo cc advanced reports 
Siemens -> Energyip prepay 
Siemens -> Xpedition package integrator 
Siemens -> Desigo cc info center 
Siemens -> Gma-manager 
Siemens -> Dynamic security assessment 
Siemens -> E-car operation center 
Siemens -> Head-end system universal device integration system 
Siemens -> Industrial edge manangement hub 
Siemens -> Energy engage 
Siemens -> Industrial edge management 
Siemens -> Logo\! soft comfort 
Siemens -> Energyip 
Siemens -> Simatic wincc 
Siemens -> Mendix 
Siemens -> Industrial edge management hub 
Siemens -> Sipass integrated 
Siemens -> Mindsphere 
Siemens -> Navigator 
Siemens -> Siveillance command 
Siemens -> NX 
Siemens -> Sentron powermanager 
Siemens -> Siveillance control 
Siemens -> Opcenter intelligence 
Siemens -> Siguard dsa 
Siemens -> Siveillance identity 
Siemens -> Operation scheduler 
Siemens -> Siveillance control pro 
Siemens -> Siveillance vantage 
Siemens -> Siveillance viewpoint 
Netapp -> Brocade san navigator 
Netapp -> Cloud insights acquisition unit 
Netapp -> Cloud manager 
Netapp -> Cloud secure agent 
Netapp -> Oncommand insight 
Netapp -> Ontap tools 
Netapp -> Snapcenter 
Intel -> Genomics kernel library 
Intel -> Sensor solution firmware development kit 
Intel -> Audio development kit 
Intel -> System studio 
Intel -> Datacenter manager 
Intel -> Oneapi 
Intel -> Secure device onboard 
Intel -> System debugger 
Intel -> Computer vision annotation tool 
Fedoraproject -> Fedora 
Debian -> Debian linux 
Arubanetworks -> Silver peak orchestrator 
Apache -> Log4j 

 References:
http://www.openwall.com/lists/oss-security/2021/12/14/4
https://logging.apache.org/log4j/2.x/security.html
https://www.cve.org/CVERecord?id=CVE-2021-44228
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
http://www.openwall.com/lists/oss-security/2021/12/15/3
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf
https://www.kb.cert.org/vuls/id/930724
https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf
https://www.debian.org/security/2021/dsa-5022
https://www.oracle.com/security-alerts/alert-cve-2021-44228.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
http://www.openwall.com/lists/oss-security/2021/12/18/1
https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf

Copyright 2024, cxsecurity.com

 

Back to Top