Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Cloud Manager Subscribe
Agile Engineering Data Management Subscribe
Agile Plm Subscribe
Agile Plm Mcad Connector Subscribe
Autovue For Agile Product Lifecycle Management Subscribe
Banking Deposits And Lines Of Credit Servicing Subscribe
Banking Enterprise Default Management Subscribe
Banking Loans Servicing Subscribe
Banking Party Management Subscribe
Banking Payments Subscribe
Banking Platform Subscribe
Banking Trade Finance Subscribe
Banking Treasury Management Subscribe
Business Intelligence Subscribe
Communications Asap Subscribe
Communications Billing And Revenue Management Subscribe
Communications Cloud Native Core Console Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment Subscribe
Communications Cloud Native Core Network Repository Function Subscribe
Communications Cloud Native Core Network Slice Selection Function Subscribe
Communications Cloud Native Core Policy Subscribe
Communications Cloud Native Core Security Edge Protection Proxy Subscribe
Communications Cloud Native Core Service Communication Proxy Subscribe
Communications Cloud Native Core Unified Data Repository Subscribe
Communications Convergence Subscribe
Communications Convergent Charging Controller Subscribe
Communications Diameter Signaling Router Subscribe
Communications Eagle Element Management System Subscribe
Communications Eagle Ftp Table Base Retrieval Subscribe
Communications Element Manager Subscribe
Communications Evolved Communications Application Server Subscribe
Communications Interactive Session Recorder Subscribe
Communications Ip Service Activator Subscribe
Communications Messaging Server Subscribe
Communications Network Charging And Control Subscribe
Communications Network Integrity Subscribe
Communications Performance Intelligence Center Subscribe
Communications Pricing Design Center Subscribe
Communications Service Broker Subscribe
Communications Services Gatekeeper Subscribe
Communications Session Report Manager Subscribe
Communications Session Route Manager Subscribe
Communications Unified Inventory Management Subscribe
Communications User Data Repository Subscribe
Communications Webrtc Session Controller Subscribe
Data Integrator Subscribe
E-business Suite Subscribe
Enterprise Manager Base Platform Subscribe
Enterprise Manager For Peoplesoft Subscribe
Enterprise Manager Ops Center Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Financial Services Model Management And Governance Subscribe
Flexcube Universal Banking Subscribe
Health Sciences Empirica Signal Subscribe
Health Sciences Inform Subscribe
Health Sciences Information Manager Subscribe
Healthcare Data Repository Subscribe
Healthcare Foundation Subscribe
Healthcare Master Person Index Subscribe
Healthcare Translational Research Subscribe
Hospitality Suite8 Subscribe
Hospitality Token Proxy Service Subscribe
Hyperion Bi\+ Subscribe
Hyperion Data Relationship Management Subscribe
Hyperion Infrastructure Technology Subscribe
Hyperion Planning Subscribe
Hyperion Profitability And Cost Management Subscribe
Hyperion Tax Provision Subscribe
Identity Management Suite Subscribe
Identity Manager Connector Subscribe
Instantis Enterprisetrack Subscribe
Insurance Data Gateway Subscribe
Insurance Insbridge Rating And Underwriting Subscribe
Jdeveloper Subscribe
Managed File Transfer Subscribe
Management Cloud Engine Subscribe
Mysql Enterprise Monitor Subscribe
Payment Interface Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Primavera Gateway Subscribe
Primavera P6 Enterprise Project Portfolio Management Subscribe
Primavera Unifier Subscribe
Retail Back Office Subscribe
Retail Central Office Subscribe
Retail Customer Insights Subscribe
Retail Data Extractor For Merchandising Subscribe
Retail Eftlink Subscribe
Retail Financial Integration Subscribe
Retail Integration Bus Subscribe
Retail Invoice Matching Subscribe
Retail Merchandising System Subscribe
Retail Order Broker Subscribe
Retail Order Management System Subscribe
Retail Point-of-service Subscribe
Retail Predictive Application Server Subscribe
Retail Price Management Subscribe
Retail Returns Management Subscribe
Retail Service Backbone Subscribe
Retail Store Inventory Management Subscribe
Siebel Ui Framework Subscribe
Sql Developer Subscribe
Taleo Platform Subscribe
Utilities Framework Subscribe
Webcenter Portal Subscribe
Webcenter Sites Subscribe
Weblogic Server Subscribe
Amq Streams Subscribe
Camel Quarkus Subscribe
Integration Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Fuse Subscribe
Logging Subscribe
Openshift Subscribe
Openshift Application Runtimes Subscribe
Red Hat Single Sign On Subscribe
Sonicwall Subscribe
6bk1602-0aa12-0tp0 Subscribe
6bk1602-0aa12-0tp0 Firmware Subscribe
6bk1602-0aa22-0tp0 Subscribe
6bk1602-0aa22-0tp0 Firmware Subscribe
6bk1602-0aa32-0tp0 Subscribe
6bk1602-0aa32-0tp0 Firmware Subscribe
6bk1602-0aa42-0tp0 Subscribe
6bk1602-0aa42-0tp0 Firmware Subscribe
6bk1602-0aa52-0tp0 Subscribe
6bk1602-0aa52-0tp0 Firmware Subscribe
Email Security Subscribe
Network Security Manager Subscribe
Web Application Firewall Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2852-1 apache-log4j2 security update
Debian DSA Debian DSA DSA-5024-1 apache-log4j2 security update
Github GHSA Github GHSA GHSA-p6xc-xr62-6r2g Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion
Ubuntu USN Ubuntu USN USN-5203-1 Apache Log4j 2 vulnerability
Ubuntu USN Ubuntu USN USN-5222-1 Apache Log4j 2 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Implement one of the following mitigation techniques: * Java 8 (or later) users should upgrade to release 2.17.0. Alternatively, this can be mitigated in configuration: * In PatternLayout in the logging configuration, replace Context Lookups like `${ctx:loginId}` or `$${ctx:loginId}` with Thread Context Map patterns (%X, %mdc, or %MDC). * Otherwise, in the configuration, remove references to Context Lookups like `${ctx:loginId}` or `$${ctx:loginId}` where they originate from sources external to the application such as HTTP headers or user input.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.65452}

epss

{'score': 0.66522}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T04:39:20.295Z

Reserved: 2021-12-16T00:00:00

Link: CVE-2021-45105

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-18T12:15:07.433

Modified: 2024-11-21T06:31:58.170

Link: CVE-2021-45105

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-12-18T00:00:00Z

Links: CVE-2021-45105 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses