This is an automated email from the ASF dual-hosted git repository.

rgoers pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/logging-log4j-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 52a159e  Fix typo
52a159e is described below

commit 52a159e90e0e818f72461c4b2e62c0663eec67e3
Author: Ralph Goers <rgo...@apache.org>
AuthorDate: Mon Jan 17 13:41:52 2022 -0700

    Fix typo
---
 log4j-1.2.17/index.html | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/log4j-1.2.17/index.html b/log4j-1.2.17/index.html
index 1dcf5cd..aa98382 100644
--- a/log4j-1.2.17/index.html
+++ b/log4j-1.2.17/index.html
@@ -159,8 +159,8 @@
                 <p><a 
href="https://www.cvedetails.com/cve/CVE-2019-17571/";>CVE-2019-17571</a> is a 
high severity issue targeting the SocketServer. Log4j includes a SocketServer 
that accepts serialized log events and deserializes them without verifying 
whether the objects are allowed or not. 
                 This can provide an attack vector that can be expoited.</p>
                 <p><a 
href="https://www.cvedetails.com/cve/CVE-2020-9488/";>CVE-2020-9488</a> is a 
moderate severity issue with the SMTPAppender. Improper validation of 
certificate with host mismatch in Apache Log4j SMTP appender. This could allow 
an SMTPS connection to be intercepted by a man-in-the-middle attack which could 
leak any log messages sent through that appender.</p>
-                <p><a 
href="https://www.cvedetails.com/cve/CVE-2021-4104/";>CVE-2021-4104</a> is a 
high severity deserialization vulnerability in JMSAppender. JMSAppender uses 
JNDI in an unprotected manner allowing any application using the JMSAppender to 
be vulnerable if it is configured to reference an untrusted site or if the site 
referenced can be accesseed by the attacker. For example, he attacker can cause 
remote code execution by manipulating the data in the LDAP store.</p>
-                <p><a 
href="https://www.cvedetails.com/cve/CVE-2022-23302/";>CVE-2022-23302</a> is a 
high severity deserialization vulnerability in JMSSink. JMSSink uses JNDI in an 
unprotected manner allowing any application using the JMSSink to be vulnerable 
if it is configured to reference an untrusted site or if the site referenced 
can be accesseed by the attacker. For example, he attacker can cause remote 
code execution by manipulating the data in the LDAP store.</p>
+                <p><a 
href="https://www.cvedetails.com/cve/CVE-2021-4104/";>CVE-2021-4104</a> is a 
high severity deserialization vulnerability in JMSAppender. JMSAppender uses 
JNDI in an unprotected manner allowing any application using the JMSAppender to 
be vulnerable if it is configured to reference an untrusted site or if the site 
referenced can be accesseed by the attacker. For example, the attacker can 
cause remote code execution by manipulating the data in the LDAP store.</p>
+                <p><a 
href="https://www.cvedetails.com/cve/CVE-2022-23302/";>CVE-2022-23302</a> is a 
high severity deserialization vulnerability in JMSSink. JMSSink uses JNDI in an 
unprotected manner allowing any application using the JMSSink to be vulnerable 
if it is configured to reference an untrusted site or if the site referenced 
can be accesseed by the attacker. For example, the attacker can cause remote 
code execution by manipulating the data in the LDAP store.</p>
                 <p><a 
href="https://www.cvedetails.com/cve/CVE-2022-23305/";>CVE-2022-23305</a> is a 
high serverity SQL injection flaw in JDBCAppender that allows the data being 
logged to modify the behavior of the component. By design, the JDBCAppender in 
Log4j 1.2.x accepts an SQL statement as a configuration parameter where the 
values to be inserted are converters from PatternLayout. The message converter, 
%m, is likely to always be included. This allows attackers to manipulate the 
SQL [...]
                 <p><a 
href="https://www.cvedetails.com/cve/CVE-2022-23307/";>CVE-2022-23307</a> is a 
critical severity against the chainsaw component in Log4j 1.x. This is the same 
issue corrected in CVE-2020-9493 fixed in Chainsaw 2.1.0 but Chainsaw was 
included as part of Log4j 1.2.x.</p> 
               <h2>Java Version Incompatibilities</h2>

Reply via email to