This is an automated email from the ASF dual-hosted git repository. ppkarwasz pushed a commit to branch feat/vdr-generation in repository https://gitbox.apache.org/repos/asf/logging-site.git
commit 0c9774ca718f4cbced06cc2265f3b196658d6544 Author: Piotr P. Karwasz <[email protected]> AuthorDate: Fri Apr 24 14:18:52 2026 +0200 feat: replace manually maintained with generated VDR --- src/site/static/cyclonedx/vdr.xml | 1074 ++++++++++++++++++------------------- 1 file changed, 533 insertions(+), 541 deletions(-) diff --git a/src/site/static/cyclonedx/vdr.xml b/src/site/static/cyclonedx/vdr.xml index f7f0739a..a613ab51 100644 --- a/src/site/static/cyclonedx/vdr.xml +++ b/src/site/static/cyclonedx/vdr.xml @@ -26,92 +26,96 @@ This file is maintained in version control[4]. - To update the VDR: - 1. Increment the `version` attribute in the `<bom>` element. - 2. Update the `<timestamp>` element in the `<metadata>` section - to the current UTC date and time. - 3. For each modified `<vulnerability>`, update its `<updated>` element. + GENERATED FILE. Do not edit by hand. To update the VDR, edit the per-CVE + files under `src/vulnerabilities/` and regenerate this file with: + + uv run scripts/vdr_aggregate.py [1] https://logging.apache.org [2] https://cyclonedx.org [3] https://logging.apache.org/log4j/2.x/support.html [4] https://github.com/apache/logging-site/tree/cyclonedx --> -<bom xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" - xmlns="http://cyclonedx.org/schema/bom/1.6" - xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.6 https://cyclonedx.org/schema/bom-1.6.xsd" - version="7" - serialNumber="urn:uuid:dfa35519-9734-4259-bba1-3e825cf4be06"> - +<bom xmlns="http://cyclonedx.org/schema/bom/1.7" + xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" + xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 https://cyclonedx.org/schema/bom-1.7.xsd" + serialNumber="urn:uuid:dfa35519-9734-4259-bba1-3e825cf4be06" + version="8"> <metadata> - <timestamp>2026-04-10T11:53:17Z</timestamp> + <timestamp>2026-04-17T00:00:00Z</timestamp> <manufacturer> <name>Apache Logging Services</name> <url>https://logging.apache.org</url> </manufacturer> </metadata> - - <!-- We add *dummy* components to refer to in `affects` blocks. - This is necessary, since not all Log4j components have SBOMs associated with them. --> + <!--We add *dummy* components to refer to in `affects` blocks. + This is necessary, since not all Log4j components have SBOMs associated with them. +--> <components> + <component type="library" bom-ref="log4cxx"> <name>Log4cxx</name> <cpe>cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:*</cpe> </component> + <component type="library" bom-ref="log4cxx-conan"> <name>Log4cxx</name> <purl>pkg:conan/log4cxx</purl> </component> - <component type="library" bom-ref="log4j-core"> - <group>org.apache.logging.log4j</group> - <name>log4j-core</name> - <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> - <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> - </component> + <component type="library" bom-ref="log4j-1.2-api"> <group>org.apache.logging.log4j</group> <name>log4j-1.2-api</name> <cpe>cpe:2.3:a:apache:log4j_1_2_api:*:*:*:*:*:*:*:*</cpe> <purl>pkg:maven/org.apache.logging.log4j/log4j-1.2-api?type=jar</purl> </component> + + <component type="library" bom-ref="log4j-core"> + <group>org.apache.logging.log4j</group> + <name>log4j-core</name> + <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe> + <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl> + </component> + <component type="library" bom-ref="log4j-layout-template-json"> <group>org.apache.logging.log4j</group> <name>log4j-layout-template-json</name> <cpe>cpe:2.3:a:apache:log4j_layout_template_json:*:*:*:*:*:*:*:*</cpe> <purl>pkg:maven/org.apache.logging.log4j/log4j-layout-template-json?type=jar</purl> </component> + <component type="library" bom-ref="log4net"> <name>Log4net</name> <cpe>cpe:2.3:a:apache:log4net:*:*:*:*:*:*:*:*</cpe> <purl>pkg:nuget/log4net</purl> </component> + </components> <vulnerabilities> <vulnerability> - <id>CVE-2026-40023</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40023</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.3</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>116</cwe> - </cwes> - <description><![CDATA[Apache Log4cxx's + <id>CVE-2026-40023</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40023</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4cxx's https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html[`XMLLayout`], in versions before 1.7.0, fails to sanitize characters forbidden by the https://www.w3.org/TR/xml/#charsets[XML 1.0 specification] @@ -119,60 +123,59 @@ in log messages, NDC, and MDC property keys and values, producing invalid XML ou Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4cxx version `1.7.0`, which fixes this issue.]]></recommendation> - <created>2026-04-10T11:53:17Z</created> - <published>2026-04-10T11:53:17Z</published> - <updated>2026-04-10T11:53:17Z</updated> - <credits> - <individuals> - <individual> - <name>Olawale Titiloye</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4cxx</ref> - <versions> - <version> - <range><![CDATA[vers:semver/>=0|<1.7.0]]></range> - </version> - </versions> - </target> - <target> - <ref>log4cxx-conan</ref> - <versions> - <version> - <range><![CDATA[vers:semver/>=0|<1.7.0]]></range> - </version> - </versions> - </target> - </affects> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4cxx version `1.7.0`, which fixes this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Olawale Titiloye</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4cxx</ref> + <versions> + <version> + <range><![CDATA[vers:semver/>=0|<1.7.0]]></range> + </version> + </versions> + </target> + <target> + <ref>log4cxx-conan</ref> + <versions> + <version> + <range><![CDATA[vers:semver/>=0|<1.7.0]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> - <id>CVE-2026-40021</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40021</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.3</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>116</cwe> - </cwes> - <description><![CDATA[Apache Log4net's + <id>CVE-2026-40021</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40021</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4net's https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-list[`XmlLayout`] and https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-list[`XmlLayoutSchemaLog4J`], @@ -182,52 +185,51 @@ in MDC property keys and values, as well as the identity field that may carry at This causes an exception during serialization and the silent loss of the affected log event. An attacker who can influence any of these fields can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net version `3.3.0`, which fixes this issue.]]></recommendation> - <created>2026-04-10T11:53:17Z</created> - <published>2026-04-10T11:53:17Z</published> - <updated>2026-04-10T11:53:17Z</updated> - <credits> - <individuals> - <individual> - <name>f00dat</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4net</ref> - <versions> - <version> - <range><![CDATA[vers:nuget/>=0|<3.3.0]]></range> - </version> - </versions> - </target> - </affects> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net version `3.3.0`, which fixes this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>f00dat</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4net</ref> + <versions> + <version> + <range><![CDATA[vers:nuget/>=0|<3.3.0]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> - <id>CVE-2026-34481</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34481</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.3</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>116</cwe> - </cwes> - <description><![CDATA[Apache Log4j's + <id>CVE-2026-34481</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34481</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4j's https://logging.apache.org/log4j/2.x/manual/json-template-layout.html[`JsonTemplateLayout`], in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (`NaN`, `Infinity`, or `-Infinity`), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records. @@ -236,58 +238,57 @@ An attacker can exploit this issue only if both of the following conditions are * The application uses `JsonTemplateLayout`. * The application logs a `MapMessage` containing an attacker-controlled floating-point value.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j JSON Template Layout version `2.25.4`, which corrects this issue.]]></recommendation> - <created>2026-04-10T11:53:17Z</created> - <published>2026-04-10T11:53:17Z</published> - <updated>2026-04-10T11:53:17Z</updated> - <credits> - <individuals> - <individual> - <name>Ap4sh (Samy Medjahed)</name> - </individual> - <individual> - <name>Ethicxz (Eliott Laurie)</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4j-layout-template-json</ref> - <versions> - <version> - <range><![CDATA[vers:maven/>=2.14.0|<2.25.4]]></range> - </version> - <version> - <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> - </version> - </versions> - </target> - </affects> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j JSON Template Layout version `2.25.4`, which corrects this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Ap4sh (Samy Medjahed)</name> + </individual> + <individual> + <name>Ethicxz (Eliott Laurie)</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-layout-template-json</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.14.0|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> - <id>CVE-2026-34480</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34480</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.9</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>116</cwe> - </cwes> - <description><![CDATA[Apache Log4j Core's + <id>CVE-2026-34480</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34480</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.9</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[Apache Log4j Core's https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout[`XmlLayout`], in versions up to and including 2.25.3, fails to sanitize characters forbidden by the https://www.w3.org/TR/xml/#charsets[XML 1.0 specification] @@ -298,128 +299,126 @@ The impact depends on the StAX implementation in use: * *JRE built-in StAX:* Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records. * *Alternative StAX implementations* (e.g., https://github.com/FasterXML/woodstox[Woodstox], a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j's internal status logger.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue by sanitizing forbidden characters before XML output.]]></recommendation> - <created>2026-04-10T11:53:17Z</created> - <published>2026-04-10T11:53:17Z</published> - <updated>2026-04-10T11:53:17Z</updated> - <credits> - <individuals> - <individual> - <name>Ap4sh (Samy Medjahed)</name> - </individual> - <individual> - <name>Ethicxz (Eliott Laurie)</name> - </individual> - <individual> - <name>jabaltarik1</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4j-core</ref> - <versions> - <version> - <range><![CDATA[vers:maven/>=2.0-alpha1|<2.25.4]]></range> - </version> - <version> - <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> - </version> - </versions> - </target> - </affects> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue by sanitizing forbidden characters before XML output.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Ap4sh (Samy Medjahed)</name> + </individual> + <individual> + <name>Ethicxz (Eliott Laurie)</name> + </individual> + <individual> + <name>jabaltarik1</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-alpha1|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> - <id>CVE-2026-34479</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34479</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.9</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>116</cwe> - </cwes> - <description><![CDATA[The `Log4j1XmlLayout` from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. + <id>CVE-2026-34479</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34479</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.9</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>116</cwe> + </cwes> + <description><![CDATA[The `Log4j1XmlLayout` from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. Two groups of users are affected: * Those using `Log4j1XmlLayout` directly in a Log4j Core 2 configuration file. * Those using the Log4j 1 configuration compatibility layer with `org.apache.log4j.xml.XMLLayout` specified as the layout class.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version `2.25.4`, which corrects this issue. + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version `2.25.4`, which corrects this issue. NOTE: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html[Log4j 1 to Log4j 2 migration guide], and specifically the section on eliminating reliance on the bridge.]]></recommendation> - <created>2026-04-10T11:53:17Z</created> - <published>2026-04-10T11:53:17Z</published> - <updated>2026-04-10T11:53:17Z</updated> - <credits> - <individuals> - <individual> - <name>Ap4sh (Samy Medjahed)</name> - </individual> - <individual> - <name>Ethicxz (Eliott Laurie)</name> - </individual> - <individual> - <name>jabaltarik1</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4j-1.2-api</ref> - <versions> - <version> - <range><![CDATA[vers:maven/>=2.7|<2.25.4]]></range> - </version> - <version> - <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta2]]></range> - </version> - </versions> - </target> - </affects> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Ap4sh (Samy Medjahed)</name> + </individual> + <individual> + <name>Ethicxz (Eliott Laurie)</name> + </individual> + <individual> + <name>jabaltarik1</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-1.2-api</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.7|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta2]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> - <id>CVE-2026-34478</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34478</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.9</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>684</cwe> - <cwe>117</cwe> - </cwes> - <description><![CDATA[Apache Log4j Core's + <id>CVE-2026-34478</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34478</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.9</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>684</cwe> + <cwe>117</cwe> + </cwes> + <description><![CDATA[Apache Log4j Core's https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout[`Rfc5424Layout`], in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes. @@ -429,55 +428,54 @@ Two distinct issues affect users of stream-based syslog services who configure ` * The `useTlsMessageFormat` attribute was silently renamed, causing users of TLS framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), without newline escaping. Users of the `SyslogAppender` are not affected, as its configuration attributes were not modified.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue.]]></recommendation> - <created>2026-04-10T11:53:17Z</created> - <published>2026-04-10T11:53:17Z</published> - <updated>2026-04-10T11:53:17Z</updated> - <credits> - <individuals> - <individual> - <name>Samuli Leinonen</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4j-core</ref> - <versions> - <version> - <range><![CDATA[vers:maven/>=2.21.0|<2.25.4]]></range> - </version> - <version> - <range><![CDATA[vers:maven/>=3.0.0-beta1|<=3.0.0-beta3]]></range> - </version> - </versions> - </target> - </affects> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Samuli Leinonen</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.21.0|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-beta1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> - <id>CVE-2026-34477</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34477</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.3</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>297</cwe> - </cwes> - <description><![CDATA[The fix for CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the + <id>CVE-2026-34477</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34477</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>297</cwe> + </cwes> + <description><![CDATA[The fix for CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName[`log4j2.sslVerifyHostName`] system property, but not when configured through the https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName[`verifyHostName`] @@ -494,73 +492,72 @@ A network-based attacker may be able to perform a man-in-the-middle attack when This issue does not affect users of the HTTP appender, which uses a separate https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName[`verifyHostname`] attribute that was not subject to this bug and verifies host names by default.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue.]]></recommendation> - <created>2026-04-10T11:53:17Z</created> - <published>2026-04-10T11:53:17Z</published> - <updated>2026-04-10T11:53:17Z</updated> - <credits> - <individuals> - <individual> - <name>Samuli Leinonen</name> - </individual> - <individual> - <name>Naresh Kandula</name> - </individual> - <individual> - <name>Vitaly Simonovich</name> - </individual> - <individual> - <name>Raijuna</name> - </individual> - <individual> - <name>Danish Siddiqui</name> - </individual> - <individual> - <name>Markus Magnuson</name> - </individual> - <individual> - <name>Haruki Oyama</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4j-core</ref> - <versions> - <version> - <range><![CDATA[vers:maven/>=2.12.0|<2.25.4]]></range> - </version> - <version> - <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> - </version> - </versions> - </target> - </affects> + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j Core version `2.25.4`, which corrects this issue.]]></recommendation> + <created>2026-04-10T11:53:17Z</created> + <published>2026-04-10T11:53:17Z</published> + <updated>2026-04-10T11:53:17Z</updated> + <credits> + <individuals> + <individual> + <name>Samuli Leinonen</name> + </individual> + <individual> + <name>Naresh Kandula</name> + </individual> + <individual> + <name>Vitaly Simonovich</name> + </individual> + <individual> + <name>Raijuna</name> + </individual> + <individual> + <name>Danish Siddiqui</name> + </individual> + <individual> + <name>Markus Magnuson</name> + </individual> + <individual> + <name>Haruki Oyama</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.12.0|<2.25.4]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> - <id>CVE-2025-68161</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2025-68161</url> - </source> - <ratings> - <rating> - <source> - <name>The Apache Software Foundation</name> - <url> - <![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> - </source> - <score>6.3</score> - <severity>medium</severity> - <method>CVSSv4</method> - <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector> - </rating> - </ratings> - <cwes> - <cwe>297</cwe> - </cwes> - <description><![CDATA[The Socket Appender in Log4j Core versions `2.0-beta9` through `2.25.2` does not perform TLS hostname verification of the peer certificate, even when the + <id>CVE-2025-68161</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-68161</url> + </source> + <ratings> + <rating> + <source> + <name>The Apache Software Foundation</name> + <url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>297</cwe> + </cwes> + <description><![CDATA[The Socket Appender in Log4j Core versions `2.0-beta9` through `2.25.2` does not perform TLS hostname verification of the peer certificate, even when the https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName[`verifyHostName`] configuration attribute or the https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName[`log4j2.sslVerifyHostName`] @@ -570,22 +567,22 @@ This issue may allow a man-in-the-middle attacker to intercept or redirect log t * The attacker is able to intercept or redirect network traffic between the client and the log receiver. * The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured).]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Log4j Core version `2.25.3`, which fully addresses this issue. + <recommendation><![CDATA[Users are advised to upgrade to Log4j Core version `2.25.3`, which fully addresses this issue. For earlier versions, the risk can be reduced by carefully restricting the trust store used by the Socket Appender.]]></recommendation> - <created>2025-12-18T16:09:38Z</created> - <published>2025-12-18T16:09:38Z</published> - <updated>2025-12-18T16:09:38Z</updated> - <affects> - <target> - <ref>log4j-core</ref> - <versions> - <version> - <range><![CDATA[vers:maven/>=2.0-beta9|<2.25.3]]></range> - </version> - </versions> - </target> - </affects> + <created>2025-12-18T16:09:38Z</created> + <published>2025-12-18T16:09:38Z</published> + <updated>2025-12-18T16:09:38Z</updated> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-beta9|<2.25.3]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability> @@ -614,8 +611,7 @@ For earlier versions, the risk can be reduced by carefully restricting the trust <description><![CDATA[When using `JSONLayout`, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. This may prevent applications that consume these logs from correctly interpreting the information within them.]]></description> - <recommendation> - <![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> + <recommendation><![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> <created>2025-08-22T07:31:10Z</created> <published>2025-08-22T07:31:10Z</published> <updated>2026-04-10T11:53:17Z</updated> @@ -680,8 +676,7 @@ In order to activate this, the following sequence must occur: * User opens the generated HTML log file in their browser, leading to potential XSS. Because logger names are generally constant strings, we assess the impact to users as LOW.]]></description> - <recommendation> - <![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> + <recommendation><![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> <created>2025-08-22T07:31:10Z</created> <published>2025-08-22T07:31:10Z</published> <updated>2026-04-10T11:53:17Z</updated> @@ -713,55 +708,6 @@ Because logger names are generally constant strings, we assess the impact to use </affects> </vulnerability> - <vulnerability> - <id>CVE-2021-44832</id> - <source> - <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2021-44832</url> - </source> - <ratings> - <rating> - <source> - <name>NVD</name> - <url> - <![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url> - </source> - <score>6.6</score> - <severity>medium</severity> - <method>CVSSv3</method> - <vector>AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vector> - </rating> - </ratings> - <cwes> - <cwe>20</cwe> - <cwe>74</cwe> - </cwes> - <description><![CDATA[An attacker with write access to the logging configuration can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. -This issue is fixed by limiting JNDI data source names to the `java` protocol.]]></description> - <recommendation><![CDATA[Upgrade to `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for Java 8 and later). - -In prior releases confirm that if the JDBC Appender is being used it is not configured to use any protocol other than `java`.]]></recommendation> - <created>2021-12-28T00:00:00Z</created> - <published>2021-12-28T00:00:00Z</published> - <updated>2025-08-17T11:18:06Z</updated> - <affects> - <target> - <ref>log4j-core</ref> - <versions> - <version> - <range><![CDATA[vers:maven/>=2.0-beta7|<2.3.1]]></range> - </version> - <version> - <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range> - </version> - <version> - <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range> - </version> - </versions> - </target> - </affects> - </vulnerability> - <vulnerability> <id>CVE-2021-45105</id> <source> @@ -781,8 +727,7 @@ In prior releases confirm that if the JDBC Appender is being used it is not conf <rating> <source> <name>NVD</name> - <url> - <![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1]]></url> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1]]></url> </source> <score>5.9</score> <severity>medium</severity> @@ -854,8 +799,7 @@ Note that this mitigation is insufficient in releases older than `2.12.2` (for J <rating> <source> <name>NVD</name> - <url> - <![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1]]></url> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1]]></url> </source> <score>9.0</score> <severity>critical</severity> @@ -919,6 +863,54 @@ Any other Lookup could also be included in a Thread Context Map variable and pos </affects> </vulnerability> + <vulnerability> + <id>CVE-2021-44832</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2021-44832</url> + </source> + <ratings> + <rating> + <source> + <name>NVD</name> + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url> + </source> + <score>6.6</score> + <severity>medium</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vector> + </rating> + </ratings> + <cwes> + <cwe>20</cwe> + <cwe>74</cwe> + </cwes> + <description><![CDATA[An attacker with write access to the logging configuration can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. +This issue is fixed by limiting JNDI data source names to the `java` protocol.]]></description> + <recommendation><![CDATA[Upgrade to `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for Java 8 and later). + +In prior releases confirm that if the JDBC Appender is being used it is not configured to use any protocol other than `java`.]]></recommendation> + <created>2021-12-28T00:00:00Z</created> + <published>2021-12-28T00:00:00Z</published> + <updated>2025-08-17T11:18:06Z</updated> + <affects> + <target> + <ref>log4j-core</ref> + <versions> + <version> + <range><![CDATA[vers:maven/>=2.0-beta7|<2.3.1]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range> + </version> + <version> + <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + <vulnerability> <id>CVE-2021-44228</id> <source> @@ -1060,80 +1052,80 @@ Alternatively, users can set the `mail.smtp.ssl.checkserveridentity` system prop </vulnerability> <vulnerability> - <id>CVE-2018-1285</id> - <source> + <id>CVE-2018-1285</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2018-1285</url> + </source> + <references> + <reference> + <id>LOG4NET-575</id> + <source> + <name>Issue tracker</name> + <url>https://issues.apache.org/jira/browse/LOG4NET-575</url> + </source> + </reference> + <reference> + <id>Security fix commit</id> + <source> + <name>Source code repository</name> + <url>https://github.com/apache/logging-log4net/commit/3242db510c27e825af7164415402f5012df521a2</url> + </source> + </reference> + <reference> + <id>Pull request</id> + <source> + <name>Pull request that fixes the issue</name> + <url>https://github.com/apache/logging-log4net/pull/64</url> + </source> + </reference> + </references> + <ratings> + <rating> + <source> <name>NVD</name> - <url>https://nvd.nist.gov/vuln/detail/CVE-2018-1285</url> - </source> - <references> - <reference> - <id>LOG4NET-575</id> - <source> - <name>Issue tracker</name> - <url>https://issues.apache.org/jira/browse/LOG4NET-575</url> - </source> - </reference> - <reference> - <id>Security fix commit</id> - <source> - <name>Source code repository</name> - <url>https://github.com/apache/logging-log4net/commit/3242db510c27e825af7164415402f5012df521a2</url> - </source> - </reference> - <reference> - <id>Pull request</id> - <source> - <name>Pull request that fixes the issue</name> - <url>https://github.com/apache/logging-log4net/pull/64</url> - </source> - </reference> - </references> - <ratings> - <rating> - <source> - <name>NVD</name> - <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url> - </source> - <score>9.8</score> - <severity>high</severity> - <method>CVSSv3</method> - <vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vector> - </rating> - </ratings> - <cwes> - <cwe>611</cwe> - </cwes> - <description><![CDATA[Apache log4net versions before 2.0.10 do not disable XML external entities + <url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url> + </source> + <score>9.8</score> + <severity>high</severity> + <method>CVSSv3</method> + <vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vector> + </rating> + </ratings> + <cwes> + <cwe>611</cwe> + </cwes> + <description><![CDATA[Apache log4net versions before 2.0.10 do not disable XML external entities when parsing log4net configuration files. This allows for XXE-based attacks in applications that accept attacker-controlled log4net configuration files.]]></description> - <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net version `2.0.10`, which fixes this issue.]]></recommendation> - <analysis> - <state>not_affected</state> - <justification>protected_by_mitigating_control</justification> - <detail><![CDATA[According to the current threat model, this is no longer considered a + <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net version `2.0.10`, which fixes this issue.]]></recommendation> + <analysis> + <state>not_affected</state> + <justification>protected_by_mitigating_control</justification> + <detail><![CDATA[According to the current threat model, this is no longer considered a vulnerability. The attack requires an attacker-controlled log4net configuration file, which is outside the scope of the threat model.]]></detail> - </analysis> - <created>2020-05-11T00:00:00Z</created> - <published>2020-05-11T00:00:00Z</published> - <updated>2026-04-17T00:00:00Z</updated> - <credits> - <individuals> - <individual> - <name>Karthik Kumar Balasundaram</name> - </individual> - </individuals> - </credits> - <affects> - <target> - <ref>log4net</ref> - <versions> - <version> - <range><![CDATA[vers:nuget/>=0|<2.0.10]]></range> - </version> - </versions> - </target> - </affects> + </analysis> + <created>2020-05-11T00:00:00Z</created> + <published>2020-05-11T00:00:00Z</published> + <updated>2026-04-17T00:00:00Z</updated> + <credits> + <individuals> + <individual> + <name>Karthik Kumar Balasundaram</name> + </individual> + </individuals> + </credits> + <affects> + <target> + <ref>log4net</ref> + <versions> + <version> + <range><![CDATA[vers:nuget/>=0|<2.0.10]]></range> + </version> + </versions> + </target> + </affects> </vulnerability> <vulnerability>
