Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion
High severity
GitHub Reviewed
Published
Dec 18, 2021
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Package
Affected versions
>= 2.4.0, < 2.12.3
>= 2.13.0, < 2.17.0
< 2.3.1
Patched versions
2.12.3
2.17.0
2.3.1
Description
Published by the National Vulnerability Database
Dec 18, 2021
Reviewed
Dec 18, 2021
Published to the GitHub Advisory Database
Dec 18, 2021
Last updated
Jan 30, 2023
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.
Affected packages
Only the
org.apache.logging.log4j:log4j-core
package is directly affected by this vulnerability. Theorg.apache.logging.log4j:log4j-api
should be kept at the same version as theorg.apache.logging.log4j:log4j-core
package to ensure compatability if in use.References