CVE-2021-42550
16.12.2021, 19:15
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.Enginsight
| Vendor | Product | Version |
|---|---|---|
| qos | logback | 𝑥 ≤ 1.2.7 |
| qos | logback | 1.3.0:alpha0 |
| qos | logback | 1.3.0:alpha1 |
| qos | logback | 1.3.0:alpha10 |
| qos | logback | 1.3.0:alpha2 |
| qos | logback | 1.3.0:alpha3 |
| qos | logback | 1.3.0:alpha4 |
| qos | logback | 1.3.0:alpha5 |
| qos | logback | 1.3.0:alpha6 |
| qos | logback | 1.3.0:alpha7 |
| qos | logback | 1.3.0:alpha8 |
| qos | logback | 1.3.0:alpha9 |
| redhat | satellite | 6.0 |
| netapp | cloud_manager | - |
| netapp | service_level_manager | - |
| netapp | snap_creator_framework | - |
| siemens | sinec_nms | 𝑥 < 1.0.3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References