Bug 2041949 (CVE-2022-23302) - CVE-2022-23302 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
Summary: CVE-2022-23302 log4j: Remote code execution in Log4j 1.x when application is ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-23302
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2042923 2042924 2042925 2042926 2042927 2042928 2042929 2042930 2042931 2048755 2042321 2042322 2042344 2042621 2042622 2042623 2042624 2042625 2042626 2042627 2042628 2042629 2042630 2042631 2042632 2042633 2042634 2042635 2042636 2042637 2042638 2042639 2042640 2042641 2042642 2042643 2042644 2042645 2042646 2042647 2042648 2042714 2048754
Blocks: 2041943
TreeView+ depends on / blocked
 
Reported: 2022-01-18 15:39 UTC by Michael Kaplan
Modified: 2022-04-19 19:20 UTC (History)
129 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSSink in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if JMSSink is deployed and has been configured to perform JNDI requests.
Clone Of:
Environment:
Last Closed: 2022-01-26 15:31:04 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2022:0680 0 None None None 2022-02-24 21:15:44 UTC
Red Hat Product Errata RHBA-2022:0802 0 None None None 2022-03-09 14:10:40 UTC
Red Hat Product Errata RHSA-2022:0289 0 None None None 2022-01-26 14:52:18 UTC
Red Hat Product Errata RHSA-2022:0290 0 None None None 2022-01-26 14:49:57 UTC
Red Hat Product Errata RHSA-2022:0291 0 None None None 2022-01-26 14:51:13 UTC
Red Hat Product Errata RHSA-2022:0294 0 None None None 2022-01-26 14:46:14 UTC
Red Hat Product Errata RHSA-2022:0430 0 None None None 2022-02-03 14:04:51 UTC
Red Hat Product Errata RHSA-2022:0435 0 None None None 2022-02-03 18:24:27 UTC
Red Hat Product Errata RHSA-2022:0436 0 None None None 2022-02-03 18:30:48 UTC
Red Hat Product Errata RHSA-2022:0437 0 None None None 2022-02-03 18:44:38 UTC
Red Hat Product Errata RHSA-2022:0438 0 None None None 2022-02-03 18:49:55 UTC
Red Hat Product Errata RHSA-2022:0439 0 None None None 2022-02-03 19:06:56 UTC
Red Hat Product Errata RHSA-2022:0442 0 None None None 2022-02-07 10:44:16 UTC
Red Hat Product Errata RHSA-2022:0444 0 None None None 2022-02-07 13:42:01 UTC
Red Hat Product Errata RHSA-2022:0445 0 None None None 2022-02-07 14:23:45 UTC
Red Hat Product Errata RHSA-2022:0446 0 None None None 2022-02-07 13:44:04 UTC
Red Hat Product Errata RHSA-2022:0447 0 None None None 2022-02-07 13:54:05 UTC
Red Hat Product Errata RHSA-2022:0448 0 None None None 2022-02-07 13:52:51 UTC
Red Hat Product Errata RHSA-2022:0449 0 None None None 2022-02-07 13:48:57 UTC
Red Hat Product Errata RHSA-2022:0450 0 None None None 2022-02-07 14:48:16 UTC
Red Hat Product Errata RHSA-2022:0467 0 None None None 2022-02-08 12:53:00 UTC
Red Hat Product Errata RHSA-2022:0469 0 None None None 2022-02-08 13:57:04 UTC
Red Hat Product Errata RHSA-2022:0475 0 None None None 2022-02-08 16:57:19 UTC
Red Hat Product Errata RHSA-2022:0497 0 None None None 2022-02-09 13:11:32 UTC
Red Hat Product Errata RHSA-2022:0507 0 None None None 2022-02-10 17:27:04 UTC
Red Hat Product Errata RHSA-2022:0524 0 None None None 2022-02-14 17:07:17 UTC
Red Hat Product Errata RHSA-2022:0527 0 None None None 2022-02-14 17:31:32 UTC
Red Hat Product Errata RHSA-2022:0553 0 None None None 2022-02-15 18:54:57 UTC
Red Hat Product Errata RHSA-2022:0661 0 None None None 2022-02-23 20:00:59 UTC
Red Hat Product Errata RHSA-2022:1296 0 None None None 2022-04-11 12:57:05 UTC
Red Hat Product Errata RHSA-2022:1297 0 None None None 2022-04-11 12:58:33 UTC
Red Hat Product Errata RHSA-2022:1299 0 None None None 2022-04-11 13:01:18 UTC

Description Michael Kaplan 2022-01-18 15:39:20 UTC
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104.  

Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default.

References: 

https://www.openwall.com/lists/oss-security/2022/01/18/3

Comment 2 juneau 2022-01-18 17:52:22 UTC
Marking /services "notaffected" per previous analysis/remediation.

Comment 26 errata-xmlrpc 2022-01-26 14:46:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:0294 https://access.redhat.com/errata/RHSA-2022:0294

Comment 27 errata-xmlrpc 2022-01-26 14:49:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:0290 https://access.redhat.com/errata/RHSA-2022:0290

Comment 28 errata-xmlrpc 2022-01-26 14:51:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:0291 https://access.redhat.com/errata/RHSA-2022:0291

Comment 29 errata-xmlrpc 2022-01-26 14:52:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:0289 https://access.redhat.com/errata/RHSA-2022:0289

Comment 30 Product Security DevOps Team 2022-01-26 15:30:58 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-23302

Comment 32 errata-xmlrpc 2022-02-03 14:04:44 UTC
This issue has been addressed in the following products:

  Red Hat Data Grid 7.3.9

Via RHSA-2022:0430 https://access.redhat.com/errata/RHSA-2022:0430

Comment 33 errata-xmlrpc 2022-02-03 18:24:19 UTC
This issue has been addressed in the following products:

  EAP 7.4 log4j async

Via RHSA-2022:0435 https://access.redhat.com/errata/RHSA-2022:0435

Comment 34 errata-xmlrpc 2022-02-03 18:30:40 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2022:0436 https://access.redhat.com/errata/RHSA-2022:0436

Comment 35 errata-xmlrpc 2022-02-03 18:44:33 UTC
This issue has been addressed in the following products:

  EAP 6.4 log4j async

Via RHSA-2022:0437 https://access.redhat.com/errata/RHSA-2022:0437

Comment 36 errata-xmlrpc 2022-02-03 18:49:48 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6
  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7

Via RHSA-2022:0438 https://access.redhat.com/errata/RHSA-2022:0438

Comment 37 errata-xmlrpc 2022-02-03 19:06:50 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:0439 https://access.redhat.com/errata/RHSA-2022:0439

Comment 39 errata-xmlrpc 2022-02-07 10:44:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.3 Advanced Update Support
  Red Hat Enterprise Linux 7.4 Advanced Update Support
  Red Hat Enterprise Linux 7.6 Advanced Update Support
  Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.6 Telco Extended Update Support
  Red Hat Enterprise Linux 7.7 Advanced Update Support
  Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions
  Red Hat Enterprise Linux 7.7 Telco Extended Update Support
  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6 Extended Lifecycle Support

Via RHSA-2022:0442 https://access.redhat.com/errata/RHSA-2022:0442

Comment 40 errata-xmlrpc 2022-02-07 13:41:55 UTC
This issue has been addressed in the following products:

  RHEL-8 based Middleware Containers

Via RHSA-2022:0444 https://access.redhat.com/errata/RHSA-2022:0444

Comment 41 errata-xmlrpc 2022-02-07 13:43:57 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.10

Via RHSA-2022:0446 https://access.redhat.com/errata/RHSA-2022:0446

Comment 42 errata-xmlrpc 2022-02-07 13:48:50 UTC
This issue has been addressed in the following products:

  RHSSO 7.5.1

Via RHSA-2022:0449 https://access.redhat.com/errata/RHSA-2022:0449

Comment 43 errata-xmlrpc 2022-02-07 13:52:46 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.5 for RHEL 8

Via RHSA-2022:0448 https://access.redhat.com/errata/RHSA-2022:0448

Comment 44 errata-xmlrpc 2022-02-07 13:53:58 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.5 for RHEL 7

Via RHSA-2022:0447 https://access.redhat.com/errata/RHSA-2022:0447

Comment 45 errata-xmlrpc 2022-02-07 14:23:38 UTC
This issue has been addressed in the following products:

  RHEL-8 based Middleware Containers

Via RHSA-2022:0445 https://access.redhat.com/errata/RHSA-2022:0445

Comment 46 errata-xmlrpc 2022-02-07 14:48:08 UTC
This issue has been addressed in the following products:

  RHEL-8 based Middleware Containers

Via RHSA-2022:0450 https://access.redhat.com/errata/RHSA-2022:0450

Comment 47 errata-xmlrpc 2022-02-08 12:52:53 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 1.6.7

Via RHSA-2022:0467 https://access.redhat.com/errata/RHSA-2022:0467

Comment 48 errata-xmlrpc 2022-02-08 13:56:57 UTC
This issue has been addressed in the following products:

  Red Hat AMQ Streams 2.0.1

Via RHSA-2022:0469 https://access.redhat.com/errata/RHSA-2022:0469

Comment 49 errata-xmlrpc 2022-02-08 16:57:12 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization Engine 4.4

Via RHSA-2022:0475 https://access.redhat.com/errata/RHSA-2022:0475

Comment 50 errata-xmlrpc 2022-02-09 13:11:25 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Data Virtualization 6.4.8.SP1

Via RHSA-2022:0497 https://access.redhat.com/errata/RHSA-2022:0497

Comment 51 errata-xmlrpc 2022-02-10 17:26:58 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Data Virtualization 6.4.8.SP2

Via RHSA-2022:0507 https://access.redhat.com/errata/RHSA-2022:0507

Comment 52 errata-xmlrpc 2022-02-14 17:07:10 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server 3 for RHEL 7

Via RHSA-2022:0524 https://access.redhat.com/errata/RHSA-2022:0524

Comment 53 errata-xmlrpc 2022-02-14 17:31:26 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Web Server

Via RHSA-2022:0527 https://access.redhat.com/errata/RHSA-2022:0527

Comment 54 errata-xmlrpc 2022-02-15 18:54:52 UTC
This issue has been addressed in the following products:

  Red Hat Fuse/AMQ 6.3.20

Via RHSA-2022:0553 https://access.redhat.com/errata/RHSA-2022:0553

Comment 55 errata-xmlrpc 2022-02-23 20:00:52 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.10.1

Via RHSA-2022:0661 https://access.redhat.com/errata/RHSA-2022:0661

Comment 56 errata-xmlrpc 2022-04-11 12:56:59 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2022:1296 https://access.redhat.com/errata/RHSA-2022:1296

Comment 57 errata-xmlrpc 2022-04-11 12:58:26 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2022:1297 https://access.redhat.com/errata/RHSA-2022:1297

Comment 58 errata-xmlrpc 2022-04-11 13:01:13 UTC
This issue has been addressed in the following products:

  EAP 7.4.4 release

Via RHSA-2022:1299 https://access.redhat.com/errata/RHSA-2022:1299


Note You need to log in before you can comment on or make changes to this bug.