{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-42550","assignerOrgId":"455daabc-a392-441d-aa46-37d35189897c","assignerShortName":"NCSC.ch","dateUpdated":"2024-08-04T03:38:49.194Z","dateReserved":"2021-10-15T00:00:00.000Z","datePublished":"2021-12-16T00:00:00.000Z"},"containers":{"cna":{"title":"RCE from attacker with configuration edit priviledges through JNDI lookup","providerMetadata":{"orgId":"455daabc-a392-441d-aa46-37d35189897c","shortName":"NCSC.ch","dateUpdated":"2022-11-08T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers."}],"affected":[{"vendor":"QOS.ch","product":"logback","versions":[{"version":"unspecified","lessThan":"1.2.9","status":"affected","versionType":"custom"},{"version":"unspecified","lessThan":"1.3.0-alpha11","status":"affected","versionType":"custom"}]}],"references":[{"url":"http://logback.qos.ch/news.html"},{"url":"https://github.com/cn-panda/logbackRceDemo"},{"url":"https://jira.qos.ch/browse/LOGBACK-1591"},{"url":"https://security.netapp.com/advisory/ntap-20211229-0001/"},{"name":"20220721 Open-Xchange Security Advisory 2022-07-21","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/Jul/11"},{"url":"http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.6,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-502 Deserialization of Untrusted Data","cweId":"CWE-502"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"EXTERNAL"},"solutions":[{"lang":"en","value":"upgrade to  >=1.2.9 or >=1.3.0-alpha11"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T03:38:49.194Z"},"title":"CVE Program Container","references":[{"url":"http://logback.qos.ch/news.html","tags":["x_transferred"]},{"url":"https://github.com/cn-panda/logbackRceDemo","tags":["x_transferred"]},{"url":"https://jira.qos.ch/browse/LOGBACK-1591","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20211229-0001/","tags":["x_transferred"]},{"name":"20220721 Open-Xchange Security Advisory 2022-07-21","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/Jul/11"},{"url":"http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf","tags":["x_transferred"]}]}]}}