JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Advanced Supply Chain Planning Subscribe
Business Intelligence Subscribe
Business Process Management Suite Subscribe
Communications Eagle Ftp Table Base Retrieval Subscribe
Communications Messaging Server Subscribe
Communications Network Integrity Subscribe
Communications Offline Mediation Controller Subscribe
Communications Unified Inventory Management Subscribe
E-business Suite Cloud Manager And Cloud Backup Module Subscribe
Enterprise Manager Base Platform Subscribe
Financial Services Revenue Management And Billing Analytics Subscribe
Fusion Middleware Common Libraries And Tools Subscribe
Goldengate Subscribe
Healthcare Data Repository Subscribe
Hyperion Data Relationship Management Subscribe
Hyperion Infrastructure Technology Subscribe
Identity Management Suite Subscribe
Jdeveloper Subscribe
Mysql Enterprise Monitor Subscribe
Retail Allocation Subscribe
Retail Extract Transform And Load Subscribe
Stream Analytics Subscribe
Timesten Grid Subscribe
Utilities Testing Accelerator Subscribe
Weblogic Server Subscribe
Codeready Studio Subscribe
Enterprise Linux Subscribe
Integration Camel K Subscribe
Integration Camel Quarkus Subscribe
Jboss A-mq Subscribe
Jboss A-mq Streaming Subscribe
Jboss Amq Subscribe
Jboss Data Grid Subscribe
Jboss Data Virtualization Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Enterprise Web Server Subscribe
Jboss Fuse Subscribe
Jboss Fuse Service Works Subscribe
Jboss Operations Network Subscribe
Jboss Web Server Subscribe
Openshift Subscribe
Openshift Application Runtimes Subscribe
Openshift Container Platform Subscribe
Process Automation Subscribe
Red Hat Single Sign On Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Software Collections Subscribe
Rhel Tus Subscribe
Rhev Manager Subscribe
Rhosemc Subscribe
Single Sign-on Subscribe
Software Collections Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2905-1 apache-log4j1.2 security update
Github GHSA Github GHSA GHSA-fp5r-v3w9-4333 JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data
Ubuntu USN Ubuntu USN USN-5223-1 Apache Log4j 1.2 vulnerability
Ubuntu USN Ubuntu USN USN-5223-2 Apache Log4j 1.2 vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 25 Nov 2024 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7

Mon, 26 Aug 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T17:16:04.172Z

Reserved: 2021-12-13T00:00:00

Link: CVE-2021-4104

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-14T12:15:12.200

Modified: 2024-11-21T06:36:54.560

Link: CVE-2021-4104

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-12-10T00:00:00Z

Links: CVE-2021-4104 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses