First published: Mon Dec 04 2023(Updated: )
A serialization vulnerability in logback receiver component part of logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Credit: vulnerability@ncsc.ch vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
Qos Logback | =1.2.12 | |
Qos Logback | =1.3.13 | |
Qos Logback | =1.4.13 | |
maven/ch.qos.logback:logback-core | =1.2.12 | 1.2.13 |
maven/ch.qos.logback:logback-core | =1.3.13 | 1.3.14 |
maven/ch.qos.logback:logback-core | =1.4.13 | 1.4.14 |
redhat/logback-classic | <1.2.13 | 1.2.13 |
redhat/logback-classic | <1.3.14 | 1.3.14 |
redhat/logback-classic | <1.4.14 | 1.4.14 |
Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.14, 1.3.14, 1.2.13 or later will remedy the vulnerability. If you do not need to deploy logback-receiver, then please verify that you do not have any <receiver></receiver> entries in your configuration files.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6481 is a vulnerability in the logback receiver component of logback versions 1.4.13, 1.3.13, and 1.2.12.
CVE-2023-6481 has a severity rating of 7.1 (high).
CVE-2023-6481 is a serialization vulnerability that allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
CVE-2023-6481 affects logback versions 1.4.13, 1.3.13, and 1.2.12.
To fix CVE-2023-6481, update logback to a version that includes the complete fix, such as version 1.4.14 or higher.