Skip to content

Incomplete fix for Apache Log4j vulnerability

Critical severity GitHub Reviewed Published Dec 14, 2021 to the GitHub Advisory Database • Updated Oct 26, 2023

Package

maven org.apache.logging.log4j:log4j-core (Maven)

Affected versions

>= 2.13.0, < 2.16.0
< 2.12.2

Patched versions

2.16.0
2.12.2

Description

Impact

The fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack.

Affected packages

Only the org.apache.logging.log4j:log4j-core package is directly affected by this vulnerability. The org.apache.logging.log4j:log4j-api should be kept at the same version as the org.apache.logging.log4j:log4j-core package to ensure compatability if in use.

Mitigation

Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).

Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property log4j2.formatMsgNoLookups to true do NOT mitigate this specific vulnerability.

References

Reviewed Dec 14, 2021
Published to the GitHub Advisory Database Dec 14, 2021
Published by the National Vulnerability Database Dec 14, 2021
Last updated Oct 26, 2023

Severity

Critical
9.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE ID

CVE-2021-45046

GHSA ID

GHSA-7rjr-3q55-vv33

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.