First published: Thu Dec 19 2024(Updated: )
Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in XML configuration files.
Credit: vulnerability@ncsc.ch vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
maven/ch.qos.logback:logback-core | <1.3.15 | 1.3.15 |
maven/ch.qos.logback:logback-core | >=1.4.0<1.5.13 | 1.5.13 |
Update to logback version 1.5.13 or later. If you are using the 1.3.x series, update to logback version 1.3.15 or later. Note that the 1.4.x series remains vulnerable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12801 has been assessed as a critical vulnerability due to its potential to allow Server-Side Request Forgery (SSRF) attacks.
To fix CVE-2024-12801, upgrade the logback-core package to version 1.3.15 or to any version from 1.5.13 and above.
CVE-2024-12801 affects logback-core versions from 0.1 up to 1.3.14 and from 1.4.0 up to 1.5.12.
CVE-2024-12801 is classified as a Server-Side Request Forgery (SSRF) vulnerability.
Yes, exploiting CVE-2024-12801 can potentially lead to data breaches by allowing attackers to execute unauthorized requests.