CVE-2021-42550
16.12.2021, 19:15
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.Enginsight
Vendor | Product | Version |
---|---|---|
qos | logback | 𝑥 ≤ 1.2.7 |
qos | logback | 1.3.0:alpha0 |
qos | logback | 1.3.0:alpha1 |
qos | logback | 1.3.0:alpha10 |
qos | logback | 1.3.0:alpha2 |
qos | logback | 1.3.0:alpha3 |
qos | logback | 1.3.0:alpha4 |
qos | logback | 1.3.0:alpha5 |
qos | logback | 1.3.0:alpha6 |
qos | logback | 1.3.0:alpha7 |
qos | logback | 1.3.0:alpha8 |
qos | logback | 1.3.0:alpha9 |
redhat | satellite | 6.0 |
netapp | cloud_manager | - |
netapp | service_level_manager | - |
netapp | snap_creator_framework | - |
siemens | sinec_nms | 𝑥 < 1.0.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References