JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

Project Subscriptions

Vendors Products
Broadcom Subscribe
Brocade Sannav Subscribe
Snapmanager Subscribe
Advanced Supply Chain Planning Subscribe
Business Intelligence Subscribe
Business Process Management Suite Subscribe
Communications Eagle Ftp Table Base Retrieval Subscribe
Communications Instant Messaging Server Subscribe
Communications Messaging Server Subscribe
Communications Network Integrity Subscribe
Communications Offline Mediation Controller Subscribe
Communications Unified Inventory Management Subscribe
E-business Suite Cloud Manager And Cloud Backup Module Subscribe
Enterprise Manager Base Platform Subscribe
Financial Services Revenue Management And Billing Analytics Subscribe
Healthcare Foundation Subscribe
Hyperion Data Relationship Management Subscribe
Hyperion Infrastructure Technology Subscribe
Identity Management Suite Subscribe
Identity Manager Connector Subscribe
Jdeveloper Subscribe
Middleware Common Libraries And Tools Subscribe
Mysql Enterprise Monitor Subscribe
Weblogic Server Subscribe
Reload4j Subscribe
Amq Streams Subscribe
Enterprise Linux Subscribe
Jboss Amq Subscribe
Jboss Data Grid Subscribe
Jboss Data Virtualization Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Enterprise Web Server Subscribe
Jboss Fuse Subscribe
Red Hat Single Sign On Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Software Collections Subscribe
Rhel Tus Subscribe
Rhev Manager Subscribe
Rhosemc Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2905-1 apache-log4j1.2 security update
EUVD EUVD EUVD-2022-0721 JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
Github GHSA Github GHSA GHSA-w9p3-5cr8-m3jj Deserialization of Untrusted Data in Log4j 1.x
Ubuntu USN Ubuntu USN USN-5998-1 Apache Log4j vulnerabilities
Ubuntu USN Ubuntu USN USN-7590-1 Apache Log4j vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Users should upgrade to Log4j 2 or remove usage of the JMSSink from their configurations.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00476}

epss

{'score': 0.00492}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0049}

epss

{'score': 0.00476}


Mon, 07 Jul 2025 18:30:00 +0000


Mon, 26 Aug 2024 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-07-07T17:47:01.136Z

Reserved: 2022-01-16T00:00:00.000Z

Link: CVE-2022-23302

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-18T16:15:08.300

Modified: 2025-07-07T18:15:24.713

Link: CVE-2022-23302

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-01-18T00:00:00Z

Links: CVE-2022-23302 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses