This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/logging-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new fe13ca1d Automatic Site Publish by Buildbot
fe13ca1d is described below

commit fe13ca1d1d6202ca00d00933371b364c1e54a246
Author: buildbot <[email protected]>
AuthorDate: Thu Dec 18 19:03:06 2025 +0000

    Automatic Site Publish by Buildbot
---
 content/cyclonedx/vdr.xml |  54 +++++++++++++++++++++++-
 content/feed.xml          |   2 +-
 content/security.html     | 102 ++++++++++++++++++++++++++++++++++++++++++++++
 3 files changed, 155 insertions(+), 3 deletions(-)

diff --git a/content/cyclonedx/vdr.xml b/content/cyclonedx/vdr.xml
index f9d382b1..c6e4acf8 100644
--- a/content/cyclonedx/vdr.xml
+++ b/content/cyclonedx/vdr.xml
@@ -40,11 +40,11 @@
 <bom xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
      xmlns="http://cyclonedx.org/schema/bom/1.6";
      xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.6 
https://cyclonedx.org/schema/bom-1.6.xsd";
-     version="4"
+     version="5"
      serialNumber="urn:uuid:dfa35519-9734-4259-bba1-3e825cf4be06">
 
   <metadata>
-    <timestamp>2025-08-22T07:31:10Z</timestamp>
+    <timestamp>2025-12-18T16:09:38Z</timestamp>
     <manufacturer>
       <name>Apache Logging Services</name>
       <url>https://logging.apache.org</url>
@@ -67,6 +67,56 @@
 
   <vulnerabilities>
 
+    <vulnerability>
+        <id>CVE-2025-68161</id>
+        <source>
+            <name>NVD</name>
+            <url>https://nvd.nist.gov/vuln/detail/CVE-2025-68161</url>
+        </source>
+        <ratings>
+            <rating>
+                <source>
+                    <name>The Apache Software Foundation</name>
+                    <url>
+                        
<![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+                </source>
+                <score>6.3</score>
+                <severity>medium</severity>
+                <method>CVSSv4</method>
+                
<vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+            </rating>
+        </ratings>
+        <cwes>
+            <cwe>297</cwe>
+        </cwes>
+        <description><![CDATA[The Socket Appender in Apache Log4j Core 
versions `2.0-beta9` through `2.25.2` does not perform TLS hostname 
verification of the peer certificate, even when the
+https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName[`verifyHostName`]
+configuration attribute or the
+https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName[`log4j2.sslVerifyHostName`]
+system property is set to `true`.
+
+This issue may allow a man-in-the-middle attacker to intercept or redirect log 
traffic under the following conditions:
+
+* The attacker is able to intercept or redirect network traffic between the 
client and the log receiver.
+* The attacker can present a server certificate issued by a certification 
authority trusted by the Socket Appender’s configured trust store (or by the 
default Java trust store if no custom trust store is 
configured).]]></description>
+        <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 
Core version `2.25.3`, which fully addresses this issue.
+
+For earlier versions, the risk can be reduced by carefully restricting the 
trust store used by the Socket Appender.]]></recommendation>
+        <created>2025-12-18T16:09:38Z</created>
+        <published>2025-12-18T16:09:38Z</published>
+        <updated>2025-12-18T16:09:38Z</updated>
+        <affects>
+            <target>
+                
<ref>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</ref>
+                <versions>
+                    <version>
+                        
<range><![CDATA[vers:maven/>=2.0-beta9|<2.25.3]]></range>
+                    </version>
+                </versions>
+            </target>
+        </affects>
+    </vulnerability>
+
     <vulnerability>
       <id>CVE-2025-54813</id>
       <source>
diff --git a/content/feed.xml b/content/feed.xml
index 1d207985..06c279d0 100644
--- a/content/feed.xml
+++ b/content/feed.xml
@@ -1,4 +1,4 @@
-<?xml version="1.0" encoding="utf-8"?><feed 
xmlns="http://www.w3.org/2005/Atom"; ><generator uri="https://jekyllrb.com/"; 
version="4.4.1">Jekyll</generator><link href="/feed.xml" rel="self" 
type="application/atom+xml" /><link href="/" rel="alternate" type="text/html" 
/><updated>2025-08-27T17:31:48+00:00</updated><id>/feed.xml</id><title 
type="html">Apache Software Foundation - Logging 
Services</title><subtitle>Write an awesome description for your new site here. 
You can edit this line in _ [...]
+<?xml version="1.0" encoding="utf-8"?><feed 
xmlns="http://www.w3.org/2005/Atom"; ><generator uri="https://jekyllrb.com/"; 
version="4.4.1">Jekyll</generator><link href="/feed.xml" rel="self" 
type="application/atom+xml" /><link href="/" rel="alternate" type="text/html" 
/><updated>2025-12-18T19:03:05+00:00</updated><id>/feed.xml</id><title 
type="html">Apache Software Foundation - Logging 
Services</title><subtitle>Write an awesome description for your new site here. 
You can edit this line in _ [...]
 
 <p>A <strong>Vulnerability Exploitability eXchange (VEX)</strong> is a 
machine-readable file used to indicate whether vulnerabilities in an 
application’s third-party dependencies are actually exploitable.</p>
 
diff --git a/content/security.html b/content/security.html
index cdd60beb..76e506c6 100644
--- a/content/security.html
+++ b/content/security.html
@@ -452,6 +452,108 @@ We choose to pool all information on this one page, 
allowing easy searching for
 </table>
 </div>
 <div class="sect2">
+<h3 id="CVE-2025-68161"><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2025-68161";>CVE-2025-68161</a></h3>
+<table class="tableblock frame-all grid-all stretch">
+<colgroup>
+<col style="width: 16.6666%;">
+<col style="width: 83.3334%;">
+</colgroup>
+<tbody>
+<tr>
+<th class="tableblock halign-left valign-top"><p 
class="tableblock">Summary</p></th>
+<td class="tableblock halign-left valign-top"><p class="tableblock">Missing 
TLS hostname verification in Socket appender</p></td>
+</tr>
+<tr>
+<th class="tableblock halign-left valign-top"><p class="tableblock">CVSS 4.x 
Score &amp; Vector</p></th>
+<td class="tableblock halign-left valign-top"><p class="tableblock">6.3 MEDIUM 
(CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N)</p></td>
+</tr>
+<tr>
+<th class="tableblock halign-left valign-top"><p class="tableblock">Components 
affected</p></th>
+<td class="tableblock halign-left valign-top"><p class="tableblock">Apache 
Log4j Core</p></td>
+</tr>
+<tr>
+<th class="tableblock halign-left valign-top"><p class="tableblock">Versions 
affected</p></th>
+<td class="tableblock halign-left valign-top"><p 
class="tableblock"><code>[2.0-beta9, 2.25.3)</code></p></td>
+</tr>
+<tr>
+<th class="tableblock halign-left valign-top"><p class="tableblock">Versions 
fixed</p></th>
+<td class="tableblock halign-left valign-top"><p 
class="tableblock"><code>2.25.3</code></p></td>
+</tr>
+</tbody>
+</table>
+<div class="sect3">
+<h4 id="CVE-2025-68161-description">Description</h4>
+<div class="paragraph">
+<p>The Socket Appender in Apache Log4j Core versions <code>2.0-beta9</code> 
through <code>2.25.2</code> does not perform TLS hostname verification of the 
peer certificate, even when the
+<a 
href="https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName";><code>verifyHostName</code></a>
+configuration attribute or the
+<a 
href="https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName";><code>log4j2.sslVerifyHostName</code></a>
+system property is set to <code>true</code>.</p>
+</div>
+<div class="paragraph">
+<p>This issue may allow a man-in-the-middle attacker to intercept or redirect 
log traffic under the following conditions:</p>
+</div>
+<div class="ulist">
+<ul>
+<li>
+<p>The attacker is able to intercept or redirect network traffic between the 
client and the log receiver.</p>
+</li>
+<li>
+<p>The attacker can present a server certificate issued by a certification 
authority trusted by the Socket Appender’s configured trust store (or by the 
default Java trust store if no custom trust store is configured).</p>
+</li>
+</ul>
+</div>
+</div>
+<div class="sect3">
+<h4 id="CVE-2025-68161-remediation">Remediation</h4>
+<div class="paragraph">
+<p>Users are advised to upgrade to Apache Log4j Core version 
<code>2.25.3</code>, which fully addresses this issue.</p>
+</div>
+<div class="paragraph">
+<p>For earlier versions, the risk can be reduced by carefully restricting the 
trust store used by the Socket Appender.</p>
+</div>
+<div class="admonitionblock note">
+<table>
+<tr>
+<td class="icon">
+<div class="title">Note</div>
+</td>
+<td class="content">
+<div class="paragraph">
+<p>When configuring a trust store for Log4j Core, we recommend following 
established best practices.
+For example,
+<a href="https://csrc.nist.gov/pubs/sp/800/52/r2/final";>NIST SP 800-52 Rev. 
2</a>
+(§4.5.2) recommends using a trust store that contains only the CA certificates 
required for the intended communication scope, such as a private or enterprise 
CA.</p>
+</div>
+</td>
+</tr>
+</table>
+</div>
+</div>
+<div class="sect3">
+<h4 id="CVE-2025-68161-credits">Credits</h4>
+<div class="paragraph">
+<p>This issue was discovered by Samuli Leinonen.</p>
+</div>
+<div class="paragraph">
+<p>It was reported through the <a 
href="https://yeswehack.com/programs/log4j-bug-bounty-program";>Apache Log4j Bug 
Bounty Program on YesWeHack</a> funded by the Sovereign Tech Agency.</p>
+</div>
+</div>
+<div class="sect3">
+<h4 id="CVE-2025-68161-references">References</h4>
+<div class="ulist">
+<ul>
+<li>
+<p><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2025-68161";>CVE-2025-68161</a></p>
+</li>
+<li>
+<p><a href="https://github.com/apache/logging-log4j2/pull/4002";>Pull request 
that fixes the issue</a></p>
+</li>
+</ul>
+</div>
+</div>
+</div>
+<div class="sect2">
 <h3 id="CVE-2025-54813"><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2025-54813";>CVE-2025-54813</a></h3>
 <table class="tableblock frame-all grid-all stretch">
 <colgroup>

Reply via email to