cassandra-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Abhishek Singh (Jira)" <j...@apache.org>
Subject [jira] [Created] (CASSANDRA-15421) CVE-2017-5929(QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.)
Date Wed, 13 Nov 2019 08:12:00 GMT
Abhishek Singh created CASSANDRA-15421:
------------------------------------------

             Summary: CVE-2017-5929(QOS.ch Logback before 1.2.0 has a serialization vulnerability
affecting the SocketServer and ServerSocketReceiver components.)
                 Key: CASSANDRA-15421
                 URL: https://issues.apache.org/jira/browse/CASSANDRA-15421
             Project: Cassandra
          Issue Type: Bug
            Reporter: Abhishek Singh


*Description :**Description :* *Severity :* CVE CVSS 2.0: 7.5Sonatype CVSS 3: 9.8
 
 *Weakness :* CVE CWE: 502
 
 *Source :* National Vulnerability Database
 
 *Categories :* Data 
 *Description from CVE :* QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting
the SocketServer and ServerSocketReceiver components.
 
 *Explanation :* The RemoteStreamAppenderClient class in logback-classic and the SocketNode
classes in logback-classic and logback-access allow data to be deserialized over a Java Socket,
via an ObjectInputStream, without validating the data beforehand.When data is received from
the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this
vulnerability by sending malicious, serialized Java objects over the connection to the Socket,
which may result in execution of arbitrary code when those objects are deserialized.Note that
although logback-core is implicated by the Logback project here, the Sonatype Security Research
team discovered that the vulnerability is actually present in the logback-classic and logback-access
components. versions prior to 1.2.0, as stated in the advisory. 
 *Detection :* The application is vulnerable by using this component. 
 *Recommendation :* We recommend upgrading to a version of this component that is not vulnerable
to this specific issue. 
 *Root Cause :* apache-cassandra-3.11.4-bin.tar.gzch/qos/logback/classic/net/SocketNode.class
: [1.0.12,1.2.0]
 
 *Advisories :* Project: https://logback.qos.ch/news.html
 
 *CVSS Details :* CVE CVSS 2.0: 7.5CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
*Occurences (Paths) :* ["apache-cassandra.zip" ; "apache-cassandra.zip"]
*CVE :* CVE-2017-5929
*URL :* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929
*Remediation :* This component does not have any non-vulnerable Version. Please contact the
vendor to get this vulnerability fixed.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@cassandra.apache.org
For additional commands, e-mail: commits-help@cassandra.apache.org


Mime
View raw message