-
Notifications
You must be signed in to change notification settings - Fork 724
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DO NOT MERGE #1445
base: codeql-poc-1
Are you sure you want to change the base?
DO NOT MERGE #1445
Conversation
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2022-23305 ] log4j:log4j 1.2.17Description: It was discovered an insufficient input check in The values inserted into the SQL statement are converted using a The An attacker can exploit this vulnerability by entering crafted strings into input fields or headers of an application that are logged and cause SQL queries to be executed. There is no published exploit for this vulnerability. The vulnerability affects only Log4j 1.2.x versions. Log4j v1 is no longer maintained, and users should upgrade to Log4j 2. Note that this vulnerability is less likely to be exploited, as An example vulnerable configuration that enables
Remediation: Deployment mitigationsPossible mitigations for the vulnerability:
[ CVE-2019-17571 ] log4j:log4j 1.2.17Description: Remediation: Development mitigationsReplace usage of [ CVE-2022-23307 ] log4j:log4j 1.2.17Description: This issue is remotely exploitable if Chainsaw is configured with the Specifically, Chainsaw (and Log4j) can receive logs via network with the Attackers that can send logs to the Apache Chainsaw server can craft a special Java Remediation: Deployment mitigationsModify the Apache Chainsaw configuration file to use
Make sure
and
[ CVE-2023-26464 ] log4j:log4j 1.2.17Description: It was discovered that an insufficient input check in An attacker can exploit this vulnerability by entering crafted strings into input fields or headers of an application that are logged and cause a denial of service. There is no published exploit for this vulnerability. The vulnerability affects only Log4j 1.2.x versions. Log4j v1 is no longer maintained, and users should upgrade to Log4j 2. Note that this vulnerability is less likely to be exploited, as Example for a vulnerable configuration:
[ CVE-2021-4104 ] log4j:log4j 1.2.17Description: [ CVE-2022-23302 ] log4j:log4j 1.2.17Description: Deserialization of untrusted data vulnerability has been discovered in the JMSSink component which uses JNDI in an unprotected manner. java -cp log4j.jar org.apache.log4j.net.JMSSink An attacker can exploit this vulnerability by providing a crafted
The vulnerability is highly unlikely to be exploitable since -
Remediation: Deployment mitigationsRemove the JMSSink class from the server's jar files. For example - zip -q -d log4j-*.jar org/apache/log4j/net/JMSSink.class Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
No description provided.