In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.

Project Subscriptions

Vendors Products
Cloud Manager Subscribe
Service Level Manager Subscribe
Snap Creator Framework Subscribe
Logback Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Satellite Subscribe
Siemens Subscribe
Sinec Nms Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2454 In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
Github GHSA Github GHSA GHSA-668q-qrv7-99fm Deserialization of Untrusted Data in logback
Ubuntu USN Ubuntu USN USN-7616-1 logback vulnerabilities
Fixes

Solution

upgrade to >=1.2.9 or >=1.3.0-alpha11


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.02163}

epss

{'score': 0.03447}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01715}

epss

{'score': 0.02163}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2024-08-04T03:38:49.194Z

Reserved: 2021-10-15T00:00:00

Link: CVE-2021-42550

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-16T19:15:08.297

Modified: 2024-11-21T06:27:47.313

Link: CVE-2021-42550

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-12-16T00:00:00Z

Links: CVE-2021-42550 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses