This is an automated email from the ASF dual-hosted git repository. ppkarwasz pushed a commit to branch feat/vdr-generation in repository https://gitbox.apache.org/repos/asf/logging-site.git
commit dc7f5f42a34ad97477b902c43a167c6289df7c27 Author: Piotr P. Karwasz <[email protected]> AuthorDate: Fri Apr 24 12:32:40 2026 +0200 feat: splits VDR into per-CVE documents --- .../CVE-2017-5645/log4j-core.cdx.xml | 101 +++++++++++++++++ src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml | 113 +++++++++++++++++++ .../CVE-2020-9488/log4j-core.cdx.xml | 106 ++++++++++++++++++ .../CVE-2021-44228/log4j-core.cdx.xml | 108 +++++++++++++++++++ .../CVE-2021-44832/log4j-core.cdx.xml | 85 +++++++++++++++ .../CVE-2021-45046/log4j-core.cdx.xml | 120 +++++++++++++++++++++ .../CVE-2021-45105/log4j-core.cdx.xml | 109 +++++++++++++++++++ src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml | 111 +++++++++++++++++++ src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml | 104 ++++++++++++++++++ .../CVE-2025-68161/log4j-core.cdx.xml | 86 +++++++++++++++ .../CVE-2026-34477/log4j-core.cdx.xml | 119 ++++++++++++++++++++ .../CVE-2026-34478/log4j-core.cdx.xml | 95 ++++++++++++++++ .../CVE-2026-34479/log4j-1.2-api.cdx.xml | 102 ++++++++++++++++++ .../CVE-2026-34480/log4j-core.cdx.xml | 101 +++++++++++++++++ .../log4j-layout-template-json.cdx.xml | 96 +++++++++++++++++ src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml | 90 ++++++++++++++++ src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml | 106 ++++++++++++++++++ 17 files changed, 1752 insertions(+) diff --git a/src/vulnerabilities/CVE-2017-5645/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2017-5645/log4j-core.cdx.xml new file mode 100644 index 00000000..4aa51f36 --- /dev/null +++ b/src/vulnerabilities/CVE-2017-5645/log4j-core.cdx.xml @@ -0,0 +1,101 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:98f7f9a1-a51d-4f98-85be-aed565b8f2f9" + version="1"> + <metadata> + <timestamp>2022-04-04T00:00:00Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2017-5645</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2017-5645</url> + </source> + <references> + <reference> + <id>LOG4J2-1863</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4J2-1863</url> + </source> + </reference> + <reference> + <id>the security fix commit</id> + <source> + <name>Source code repository</name> + <url>https://github.com/apache/logging-log4j2/commit/5dcc192</url> + </source> + </reference> + </references> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0]]></url> + </source> + <score>7.5</score> + <severity>high</severity> + <method>CVSSv2</method> + <vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</vector> + </rating> + </ratings> + <cwes> + <cwe>502</cwe> + </cwes> + <description><![CDATA[When using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.]]></description> + <recommendation><![CDATA[Java 7 and above users should migrate to version `2.8.2` or avoid using the socket server classes. +Java 6 users should avoid using the TCP or UDP socket server classes, or they can manually backport the security fix commit[1] from `2.8.2`. + +[1] https://github.com/apache/logging-log4j2/commit/5dcc192]]></recommendation> + <created>2017-04-17T00:00:00Z</created> + <published>2017-04-17T00:00:00Z</published> + <updated>2022-04-04T00:00:00Z</updated> + <credits> + <individuals> + <individual> + <name>Marcio Almeida de Macedo</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-alpha1|<2.8.2]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml b/src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml new file mode 100644 index 00000000..90aef0ae --- /dev/null +++ b/src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml @@ -0,0 +1,113 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:ca5196e2-dedb-4528-b093-200cdc0a54a5" + version="1"> + <metadata> + <timestamp>2026-04-17T00:00:00Z</timestamp> + <component type="library" bom-ref="log4net"> + <name>Log4net</name> + <cpe>cpe:2.3:a:apache:log4net:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:nuget/log4net</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2018-1285</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2018-1285</url> + </source> + <references> + <reference> + <id>LOG4NET-575</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4NET-575</url> + </source> + </reference> + <reference> + <id>Security fix commit</id> + <source> + <name>Source code repository</name> + <url>https://github.com/apache/logging-log4net/commit/3242db510c27e825af7164415402f5012df521a2</url> + </source> + </reference> + <reference> + <id>Pull request</id> + <source> + <name>Pull request that fixes the issue</name> + <url>https://github.com/apache/logging-log4net/pull/64</url> + </source> + </reference> + </references> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url> + </source> + <score>9.8</score> + <severity>high</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vector> + </rating> + </ratings> + <cwes> + <cwe>611</cwe> + </cwes> + <description><![CDATA[Apache log4net versions before 2.0.10 do not disable XML external entities + when parsing log4net configuration files. This allows for XXE-based attacks + in applications that accept attacker-controlled log4net configuration files.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net version `2.0.10`, which fixes this issue.]]></recommendation> + <analysis> + <state>not_affected</state> + <justification>protected_by_mitigating_control</justification> + <detail><![CDATA[According to the current threat model, this is no longer considered a + vulnerability. The attack requires an attacker-controlled log4net configuration + file, which is outside the scope of the threat model.]]></detail> + </analysis> + <created>2020-05-11T00:00:00Z</created> + <published>2020-05-11T00:00:00Z</published> + <updated>2026-04-17T00:00:00Z</updated> + <credits> + <individuals> + <individual> + <name>Karthik Kumar Balasundaram</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4net</ref> + <versions> + <version> + <range><![CDATA[vers:nuget/>=0|<2.0.10]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2020-9488/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2020-9488/log4j-core.cdx.xml new file mode 100644 index 00000000..00163505 --- /dev/null +++ b/src/vulnerabilities/CVE-2020-9488/log4j-core.cdx.xml @@ -0,0 +1,106 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:ca3a212d-6ec2-4bac-8810-777313f0da85" + version="1"> + <metadata> + <timestamp>2025-08-17T11:18:06Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2020-9488</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2020-9488</url> + </source> + <references> + <reference> + <id>LOG4J2-2819</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4J2-2819</url> + </source> + </reference> + </references> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&version=3.1]]></url> + </source> + <score>3.7</score> + <severity>low</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vector> + </rating> + </ratings> + <cwes> + <cwe>295</cwe> + </cwes> + <description><![CDATA[Improper validation of certificate with host mismatch in SMTP appender. +This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log +messages sent through that appender. + +The reported issue was caused by an error in `SslConfiguration`. +Any element using `SslConfiguration` in the Log4j `Configuration` is also affected by this issue. +This includes `HttpAppender`, `SocketAppender`, and `SyslogAppender`. +Usages of `SslConfiguration` that are configured via system properties are not affected.]]></description> + <recommendation><![CDATA[Upgrade to `2.3.2` (Java 6), `2.12.3` (Java 7) or `2.13.2` (Java 8 and later). + +Alternatively, users can set the `mail.smtp.ssl.checkserveridentity` system property to `true` to enable SMTPS hostname verification for all SMTPS mail sessions.]]></recommendation> + <created>2017-04-27T00:00:00Z</created> + <published>2017-04-27T00:00:00Z</published> + <updated>2025-08-17T11:18:06Z</updated> + <credits> + <individuals> + <individual> + <name>Peter Stöckli</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-beta1|<2.3.2]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range> + </version> + <version> + <version><![CDATA[vers:maven/>=2.13.0|<2.13.2]]></version> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2021-44228/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2021-44228/log4j-core.cdx.xml new file mode 100644 index 00000000..4c0f3859 --- /dev/null +++ b/src/vulnerabilities/CVE-2021-44228/log4j-core.cdx.xml @@ -0,0 +1,108 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:6893e032-dba4-4db0-8ed2-2bd0c2009b05" + version="1"> + <metadata> + <timestamp>2025-08-17T11:18:06Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2021-44228</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2021-44228</url> + </source> + <references> + <reference> + <id>LOG4J2-3198</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4J2-3198</url> + </source> + </reference> + <reference> + <id>LOG4J2-3201</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4J2-3201</url> + </source> + </reference> + </references> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1]]></url> + </source> + <score>10.0</score> + <severity>critical</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</vector> + </rating> + </ratings> + <cwes> + <cwe>20</cwe> + <cwe>400</cwe> + <cwe>502</cwe> + <cwe>917</cwe> + </cwes> + <description><![CDATA[In Log4j, the JNDI features used in configurations, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI related endpoints. +An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers.]]></description> + <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.2` (for Java 7), or `2.15.0` (for Java 8 and later).]]></recommendation> + <created>2021-12-10T00:00:00Z</created> + <published>2021-12-10T00:00:00Z</published> + <updated>2025-08-17T11:18:06Z</updated> + <credits> + <individuals> + <individual> + <name>Chen Zhaojun</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-beta9|<2.3.1]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.4|<2.12.2]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.13.0|<2.15.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2021-44832/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2021-44832/log4j-core.cdx.xml new file mode 100644 index 00000000..f7d1bf3c --- /dev/null +++ b/src/vulnerabilities/CVE-2021-44832/log4j-core.cdx.xml @@ -0,0 +1,85 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:9cda751a-5464-4d33-aca1-9046a27047ca" + version="1"> + <metadata> + <timestamp>2025-08-17T11:18:06Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2021-44832</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2021-44832</url> + </source> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url> + </source> + <score>6.6</score> + <severity>medium</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vector> + </rating> + </ratings> + <cwes> + <cwe>20</cwe> + <cwe>74</cwe> + </cwes> + <description><![CDATA[An attacker with write access to the logging configuration can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. +This issue is fixed by limiting JNDI data source names to the `java` protocol.]]></description> + <recommendation><![CDATA[Upgrade to `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for Java 8 and later). + +In prior releases confirm that if the JDBC Appender is being used it is not configured to use any protocol other than `java`.]]></recommendation> + <created>2021-12-28T00:00:00Z</created> + <published>2021-12-28T00:00:00Z</published> + <updated>2025-08-17T11:18:06Z</updated> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-beta7|<2.3.1]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2021-45046/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2021-45046/log4j-core.cdx.xml new file mode 100644 index 00000000..ff50239e --- /dev/null +++ b/src/vulnerabilities/CVE-2021-45046/log4j-core.cdx.xml @@ -0,0 +1,120 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:2a910e8a-9842-4bec-8e4a-ccf1d7a227d1" + version="1"> + <metadata> + <timestamp>2025-08-17T11:18:06Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2021-45046</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2021-45046</url> + </source> + <references> + <reference> + <id>LOG4J2-3221</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4J2-3221</url> + </source> + </reference> + </references> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1]]></url> + </source> + <score>9.0</score> + <severity>critical</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H</vector> + </rating> + </ratings> + <cwes> + <cwe>917</cwe> + </cwes> + <description><![CDATA[It was found that the fix to address CVE-2021-44228 in Log4j `2.15.0` was incomplete in certain non-default configurations. +When the logging configuration uses a non-default Pattern Layout with a Thread Context Lookup (for example, `$${ctx:loginId}`), attackers with control over Thread Context Map (MDC) can craft malicious input data using a JNDI Lookup pattern, resulting in an information leak and remote code execution in some environments and local code execution in all environments. +Remote code execution has been demonstrated on macOS, Fedora, Arch Linux, and Alpine Linux. + +Note that this vulnerability is not limited to just the JNDI lookup. +Any other Lookup could also be included in a Thread Context Map variable and possibly have private details exposed to anyone with access to the logs.]]></description> + <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.16.0` (for Java 8 and later).]]></recommendation> + <created>2021-12-14T00:00:00Z</created> + <published>2021-12-14T00:00:00Z</published> + <updated>2025-08-17T11:18:06Z</updated> + <credits> + <individuals> + <individual> + <name>Kai Mindermann</name> + </individual> + <individual> + <name>4ra1n</name> + </individual> + <individual> + <name>Ash Fox</name> + </individual> + <individual> + <name>Alvaro Muñoz</name> + </individual> + <individual> + <name>Tony Torralba</name> + </individual> + <individual> + <name>Anthony Weems</name> + </individual> + <individual> + <name>RyotaK</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-beta9|<2.3.1]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.13.0|<2.16.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2021-45105/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2021-45105/log4j-core.cdx.xml new file mode 100644 index 00000000..39c1f364 --- /dev/null +++ b/src/vulnerabilities/CVE-2021-45105/log4j-core.cdx.xml @@ -0,0 +1,109 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:439aec1b-2139-4a8e-8167-7550e904b8f8" + version="1"> + <metadata> + <timestamp>2022-10-06T00:00:00Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2021-45105</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2021-45105</url> + </source> + <references> + <reference> + <id>LOG4J2-3230</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4J2-3230</url> + </source> + </reference> + </references> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1]]></url> + </source> + <score>5.9</score> + <severity>medium</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vector> + </rating> + </ratings> + <cwes> + <cwe>20</cwe> + <cwe>674</cwe> + </cwes> + <description><![CDATA[Log4j versions `2.0-alpha1` through `2.16.0` (excluding `2.3.1` and `2.12.3`), did not protect from uncontrolled recursion that can be implemented using self-referential lookups. +When the logging configuration uses a non-default Pattern Layout with a Context Lookup (for example, `$${ctx:loginId}`), attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup, resulting in a `StackOverflowError` that will terminate the process.]]></description> + <recommendation><![CDATA[Upgrade to `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for Java 8 and later). + +Alternatively, this infinite recursion issue can be mitigated in configuration: + +* In PatternLayout in the logging configuration, replace Context Lookups like `${ctx:loginId}` or `$${ctx:loginId}` with Thread Context Map patterns (`%X`, `%mdc`, or `%MDC`). +* Otherwise, in the configuration, remove references to Context Lookups like `${ctx:loginId}` or `$${ctx:loginId}` where they originate +from sources external to the application such as HTTP headers or user input. +Note that this mitigation is insufficient in releases older than `2.12.2` (for Java 7), and `2.16.0` (for Java 8 and later) as the issues fixed in those releases will still be present.]]></recommendation> + <created>2021-12-18T00:00:00Z</created> + <published>2021-12-18T00:00:00Z</published> + <updated>2022-10-06T00:00:00Z</updated> + <credits> + <individuals> + <individual> + <name>Hideki Okamoto</name> + </individual> + <individual> + <name>Guy Lederfein</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-alpha1|<2.3.1]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml b/src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml new file mode 100644 index 00000000..b6cbb9ea --- /dev/null +++ b/src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml @@ -0,0 +1,111 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:e3f4189d-9ba5-4d6c-916b-caf3cb428085" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4cxx"> + <name>Log4cxx</name> + <cpe>cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:*</cpe> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <components> + <component type="library" bom-ref="log4cxx-conan"> + <name>Log4cxx</name> + <purl>pkg:conan/log4cxx</purl> + </component> + </components> + <dependencies> + <dependency ref="log4cxx-conan"> + <dependency ref="log4cxx"/> + </dependency> + </dependencies> + <vulnerabilities> + <vulnerability> + <id>CVE-2025-54812</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-54812</url> + </source> + <ratings> + <rating> + <source> + <name>NVD</name> + <url> + https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N + </url> + </source> + <score>2.1</score> + <severity>low</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>117</cwe> + </cwes> + <description><![CDATA[When using `HTMLLayout`, logger names are not properly escaped when writing out to the HTML file. +If untrusted data is used to retrieve the name of a logger, an attacker could theoretically inject HTML or JavaScript in order to hide information from logs or steal data from the user. +In order to activate this, the following sequence must occur: + +* Log4cxx is configured to use `HTMLLayout`. +* Logger name comes from an untrusted string. +* Logger with compromised name logs a message. +* User opens the generated HTML log file in their browser, leading to potential XSS. + +Because logger names are generally constant strings, we assess the impact to users as LOW.]]></description> + <recommendation><![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> + <created>2025-08-22T07:31:10Z</created> + <published>2025-08-22T07:31:10Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <organizations> + <organization> + <name>Sovereign Tech Agency</name> + <url>https://www.sovereign.tech/</url> + </organization> + </organizations> + </credits> + <affects> + <target> + <ref>log4cxx</ref> + <versions> + <version> + <range><![CDATA[vers:semver/<1.5.0]]></range> + </version> + </versions> + </target> + <target> + <ref>log4cxx-conan</ref> + <versions> + <version> + <range><![CDATA[vers:semver/<1.5.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml b/src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml new file mode 100644 index 00000000..3d6923a4 --- /dev/null +++ b/src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml @@ -0,0 +1,104 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:b65cdbe3-6fb9-4ce9-9d70-55690bb1b11a" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4cxx"> + <name>Log4cxx</name> + <cpe>cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:*</cpe> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <components> + <component type="library" bom-ref="log4cxx-conan"> + <name>Log4cxx</name> + <purl>pkg:conan/log4cxx</purl> + </component> + </components> + <dependencies> + <dependency ref="log4cxx-conan"> + <dependency ref="log4cxx"/> + </dependency> + </dependencies> + <vulnerabilities> + <vulnerability> + <id>CVE-2025-54813</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-54813</url> + </source> + <ratings> + <rating> + <source> + <name>NVD</name> + <url> + https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N + </url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>117</cwe> + </cwes> + <description><![CDATA[When using `JSONLayout`, not all payload bytes are properly escaped. +If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. +This may prevent applications that consume these logs from correctly interpreting the information within them.]]></description> + <recommendation><![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> + <created>2025-08-22T07:31:10Z</created> + <published>2025-08-22T07:31:10Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <organizations> + <organization> + <name>Sovereign Tech Agency</name> + <url>https://www.sovereign.tech/</url> + </organization> + </organizations> + </credits> + <affects> + <target> + <ref>log4cxx</ref> + <versions> + <version> + <range><![CDATA[vers:semver/>=0.11.0|<1.5.0]]></range> + </version> + </versions> + </target> + <target> + <ref>log4cxx-conan</ref> + <versions> + <version> + <range><![CDATA[vers:semver/>=0.11.0|<1.5.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2025-68161/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2025-68161/log4j-core.cdx.xml new file mode 100644 index 00000000..4f9243c3 --- /dev/null +++ b/src/vulnerabilities/CVE-2025-68161/log4j-core.cdx.xml @@ -0,0 +1,86 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:78b4d9a0-9d3e-47cb-93d9-d31689de2bbb" + version="1"> + <metadata> + <timestamp>2025-12-18T16:09:38Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2025-68161</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-68161</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>297</cwe> + </cwes> + <description><![CDATA[The Socket Appender in Log4j Core versions `2.0-beta9` through `2.25.2` does not perform TLS hostname verification of the peer certificate, even when the +https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName[`verifyHostName`] +configuration attribute or the +https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName[`log4j2.sslVerifyHostName`] +system property is set to `true`. + +This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions: + +* The attacker is able to intercept or redirect network traffic between the client and the log receiver. +* The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured).]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Log4j Core version `2.25.3`, which fully addresses this issue. + +For earlier versions, the risk can be reduced by carefully restricting the trust store used by the Socket Appender.]]></recommendation> + <created>2025-12-18T16:09:38Z</created> + <published>2025-12-18T16:09:38Z</published> + <updated>2025-12-18T16:09:38Z</updated> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-beta9|<2.25.3]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2026-34477/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2026-34477/log4j-core.cdx.xml new file mode 100644 index 00000000..7625b200 --- /dev/null +++ b/src/vulnerabilities/CVE-2026-34477/log4j-core.cdx.xml @@ -0,0 +1,119 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:85f8bc61-8ec0-4c05-9185-16676480cc5b" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2026-34477</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34477</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>297</cwe> + </cwes> + <description><![CDATA[The fix for CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the +https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName[`log4j2.sslVerifyHostName`] +system property, but not when configured through the +https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName[`verifyHostName`] +attribute of the `<Ssl>` element. + +Although the `verifyHostName` configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value. + +A network-based attacker may be able to perform a man-in-the-middle attack when *all* of the following conditions are met: + +* An SMTP, Socket, or Syslog appender is in use. +* TLS is configured via a nested `<Ssl>` element. +* The attacker can present a certificate issued by a CA trusted by the appender's configured trust store, or by the default Java trust store if none is configured. + +This issue does not affect users of the HTTP appender, which uses a separate +https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName[`verifyHostname`] +attribute that was not subject to this bug and verifies host names by default.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Samuli Leinonen</name> + </individual> + <individual> + <name>Naresh Kandula</name> + </individual> + <individual> + <name>Vitaly Simonovich</name> + </individual> + <individual> + <name>Raijuna</name> + </individual> + <individual> + <name>Danish Siddiqui</name> + </individual> + <individual> + <name>Markus Magnuson</name> + </individual> + <individual> + <name>Haruki Oyama</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.12.0|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2026-34478/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2026-34478/log4j-core.cdx.xml new file mode 100644 index 00000000..34c800b5 --- /dev/null +++ b/src/vulnerabilities/CVE-2026-34478/log4j-core.cdx.xml @@ -0,0 +1,95 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:0b9835b2-6bf0-4c2e-bc40-e2ce623a34c7" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2026-34478</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34478</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.9</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>684</cwe> + <cwe>117</cwe> + </cwes> + <description><![CDATA[Apache Log4j Core's +https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout[`Rfc5424Layout`], +in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes. + +Two distinct issues affect users of stream-based syslog services who configure `Rfc5424Layout` directly: + +* The `newLineEscape` attribute was silently renamed, causing newline escaping to stop working for users of TCP framing (RFC 6587), exposing them to CRLF injection in log output. +* The `useTlsMessageFormat` attribute was silently renamed, causing users of TLS framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), without newline escaping. + +Users of the `SyslogAppender` are not affected, as its configuration attributes were not modified.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Samuli Leinonen</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.21.0|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-beta1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2026-34479/log4j-1.2-api.cdx.xml b/src/vulnerabilities/CVE-2026-34479/log4j-1.2-api.cdx.xml new file mode 100644 index 00000000..00d71226 --- /dev/null +++ b/src/vulnerabilities/CVE-2026-34479/log4j-1.2-api.cdx.xml @@ -0,0 +1,102 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:4c8d43b2-f154-4d72-a801-525289431a2a" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4j-1.2-api"> + <group>org.apache.logging.log4j</group> + <name>log4j-1.2-api</name> + <cpe>cpe:2.3:a:apache:log4j_1_2_api:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-1.2-api?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2026-34479</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34479</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.9</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[The `Log4j1XmlLayout` from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. +Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. + +Two groups of users are affected: + +* Those using `Log4j1XmlLayout` directly in a Log4j Core 2 configuration file. +* Those using the Log4j 1 configuration compatibility layer with `org.apache.log4j.xml.XMLLayout` specified as the layout class.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version `2.25.4`, which corrects this issue. + +NOTE: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. +Users are encouraged to consult the +https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html[Log4j 1 to Log4j 2 migration guide], +and specifically the section on eliminating reliance on the bridge.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Ap4sh (Samy Medjahed)</name> + </individual> + <individual> + <name>Ethicxz (Eliott Laurie)</name> + </individual> + <individual> + <name>jabaltarik1</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-1.2-api</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.7|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta2]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2026-34480/log4j-core.cdx.xml b/src/vulnerabilities/CVE-2026-34480/log4j-core.cdx.xml new file mode 100644 index 00000000..74555afe --- /dev/null +++ b/src/vulnerabilities/CVE-2026-34480/log4j-core.cdx.xml @@ -0,0 +1,101 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:79b538cc-2f8a-4484-83e1-c7803218241b" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2026-34480</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34480</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.9</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4j Core's +https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout[`XmlLayout`], +in versions up to and including 2.25.3, fails to sanitize characters forbidden by the +https://www.w3.org/TR/xml/#charsets[XML 1.0 specification] +producing invalid XML output whenever a log message or MDC value contains such characters. + +The impact depends on the StAX implementation in use: + +* *JRE built-in StAX:* Forbidden characters are silently written to the output, producing malformed XML. +Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records. +* *Alternative StAX implementations* (e.g., https://github.com/FasterXML/woodstox[Woodstox], a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j's internal status logger.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue by sanitizing forbidden characters before XML output.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Ap4sh (Samy Medjahed)</name> + </individual> + <individual> + <name>Ethicxz (Eliott Laurie)</name> + </individual> + <individual> + <name>jabaltarik1</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-alpha1|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2026-34481/log4j-layout-template-json.cdx.xml b/src/vulnerabilities/CVE-2026-34481/log4j-layout-template-json.cdx.xml new file mode 100644 index 00000000..ea338337 --- /dev/null +++ b/src/vulnerabilities/CVE-2026-34481/log4j-layout-template-json.cdx.xml @@ -0,0 +1,96 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:a3302fbc-45c3-47e7-9b93-20166b1a4070" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4j-layout-template-json"> + <group>org.apache.logging.log4j</group> + <name>log4j-layout-template-json</name> + <cpe>cpe:2.3:a:apache:log4j_layout_template_json:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-layout-template-json?type=jar</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2026-34481</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34481</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4j's +https://logging.apache.org/log4j/2.x/manual/json-template-layout.html[`JsonTemplateLayout`], +in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (`NaN`, `Infinity`, or `-Infinity`), which are prohibited by RFC 8259. +This may cause downstream log processing systems to reject or fail to index affected records. + +An attacker can exploit this issue only if both of the following conditions are met: + +* The application uses `JsonTemplateLayout`. +* The application logs a `MapMessage` containing an attacker-controlled floating-point value.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j JSON Template Layout version `2.25.4`, which corrects this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Ap4sh (Samy Medjahed)</name> + </individual> + <individual> + <name>Ethicxz (Eliott Laurie)</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-layout-template-json</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.14.0|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml b/src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml new file mode 100644 index 00000000..c412b144 --- /dev/null +++ b/src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml @@ -0,0 +1,90 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:2dcb287c-5b4d-4633-98b8-8a86d0949460" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4net"> + <name>Log4net</name> + <cpe>cpe:2.3:a:apache:log4net:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:nuget/log4net</purl> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <vulnerabilities> + <vulnerability> + <id>CVE-2026-40021</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40021</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4net's +https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-list[`XmlLayout`] +and +https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-list[`XmlLayoutSchemaLog4J`], +in versions before 3.3.0, fail to sanitize characters forbidden by the +https://www.w3.org/TR/xml/#charsets[XML 1.0 specification] +in MDC property keys and values, as well as the identity field that may carry attacker-influenced data. +This causes an exception during serialization and the silent loss of the affected log event. + +An attacker who can influence any of these fields can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net version `3.3.0`, which fixes this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>f00dat</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4net</ref> + <versions> + <version> + <range><![CDATA[vers:nuget/>=0|<3.3.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom> diff --git a/src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml b/src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml new file mode 100644 index 00000000..21b70039 --- /dev/null +++ b/src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml @@ -0,0 +1,106 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!-- + ~ Licensed to the Apache Software Foundation (ASF) under one or more + ~ contributor license agreements. See the NOTICE file distributed with + ~ this work for additional information regarding copyright ownership. + ~ The ASF licenses this file to you under the Apache License, Version 2.0 + ~ (the "License"); you may not use this file except in compliance with + ~ the License. You may obtain a copy of the License at + ~ + ~ http://www.apache.org/licenses/LICENSE-2.0 + ~ + ~ Unless required by applicable law or agreed to in writing, software + ~ distributed under the License is distributed on an "AS IS" BASIS, + ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + ~ See the License for the specific language governing permissions and + ~ limitations under the License. + --> +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:564f80b5-ce22-4145-bca1-c13a4fbd2070" + version="1"> + <metadata> + <timestamp>2026-04-10T11:53:17Z</timestamp> + <component type="library" bom-ref="log4cxx"> + <name>Log4cxx</name> + <cpe>cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:*</cpe> + </component> + <manufacturer> + <name>Apache Logging Services</name> + <url>https://logging.apache.org</url> + </manufacturer> + </metadata> + <components> + <component type="library" bom-ref="log4cxx-conan"> + <name>Log4cxx</name> + <purl>pkg:conan/log4cxx</purl> + </component> + </components> + <dependencies> + <dependency ref="log4cxx-conan"> + <dependency ref="log4cxx"/> + </dependency> + </dependencies> + <vulnerabilities> + <vulnerability> + <id>CVE-2026-40023</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40023</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4cxx's +https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html[`XMLLayout`], +in versions before 1.7.0, fails to sanitize characters forbidden by the +https://www.w3.org/TR/xml/#charsets[XML 1.0 specification] +in log messages, NDC, and MDC property keys and values, producing invalid XML output. +Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. + +An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity.]]></description> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4cxx version `1.7.0`, which fixes this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Olawale Titiloye</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4cxx</ref> + <versions> + <version> + <range><![CDATA[vers:semver/>=0|<1.7.0]]></range> + </version> + </versions> + </target> + <target> + <ref>log4cxx-conan</ref> + <versions> + <version> + <range><![CDATA[vers:semver/>=0|<1.7.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + </vulnerabilities> +</bom>
