Remote code execution vulnerability in Apache Log4j - CVE-2021-45046 (linux)ID: oval:org.secpod.oval:def:78647 | Date: (C)2022-04-11 (M)2023-11-02 |
Class: VULNERABILITY | Family: unix |
The host is installed with Apache Log4j 2.0.x through 2.15.0 (excluding security releases 2.3.1, 2.12.2 and 2.12.3) and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle issue in the logging configuration when it uses a non-default Pattern Layout with a Context Lookup. Successful exploitation could allow attackers with control over Thread Context Map (MDC) input data can craft malicious input data using a JNDI Lookup pattern, resulting in an information leak and remote code execution in some environments and local code execution in all environments.