Deserialization of Untrusted Data in Log4j
Critical severity
GitHub Reviewed
Published
Jan 6, 2020
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Apr 17, 2017
Reviewed
Dec 27, 2019
Published to the GitHub Advisory Database
Jan 6, 2020
Last updated
Feb 1, 2023
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
References