CVE-2021-45046

Scores

EPSS

0.943high94.3%
0%20%40%60%80%100%

Percentile: 94.3%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
5.1

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Description

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-917

Related Vulnerabilities

Exploits

Exploit ID: CVE-2021-45046

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Recommendations

Source: nvd

In Log4j 2.12.2 (for Java 7) and 2.16.0 (for Java 8 or later) the message lookups feature has been completely removed. In addition, JNDI is disabled by default and other default configuration settings are modified to mitigate CVE-2021-44228 and CVE-2021-45046.For Log4j 1, remove the JMSAppender class or do not configure it. Log4j 1 is not supported and likely contains unfixed bugs and vulnerabilities (such as CVE-2019-17571).For applications, services, and systems that use Log4j, consult the appropriate vendor or provider. See the CISA Log4j Software List and the Vendor Information section below.

URL: https://www.kb.cert.org/vuls/id/930724

Source: nvd

All Ubiquity UniFi users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=net-wireless/unifi-6.5.55”

URL: https://security.gentoo.org/glsa/202310-16

Vulnerable Software (66)

Type: Configuration

Product: apache-log4j2

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: apache-log4j2

Operating System: ubuntu focal 20.04

Trait:
{  "fixed": "2.16.0-0.20.04.1"}

Source: ubuntu

Type: Configuration

Product: apache-log4j2

Operating System: ubuntu hirsute 21.04

Trait:
{  "fixed": "2.16.0-0.21.04.1"}

Source: ubuntu

Type: Configuration

Product: apache-log4j2

Operating System: ubuntu impish 21.10

Trait:
{  "fixed": "2.16.0-0.21.10.1"}

Source: ubuntu

Type: Configuration

Product: apache-log4j2

Operating System: ubuntu jammy 22.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: apache-log4j2

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: apache-log4j2

Operating System: ubuntu xenial 16.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: apache-log4j2

Operating System: debian

Trait:
{  "fixed": "2.16.0-1"}

Source: debian

Type: Configuration

Product: apache-log4j2

Operating System: debian stretch 9

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: eap7-log4j

Operating System: rhel

Trait:
{  "fixed": "2.17.1-1.redhat_00001.1.el8eap"}

Source: redhat