Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12  on the Java platform, allows an attacker to
forge requests by compromising logback configuration files in XML.



The attacks involves the modification of DOCTYPE declaration in  XML configuration files.
Fixes

Solution

Update to logback version 1.5.13 or later. If you are using the 1.3.x series, update to logback version 1.3.15 or later. Note that the 1.4.x series remains vulnerable.


Workaround

Update to logback version 1.5.13 or later. If you are using the 1.3.x series, update to logback version 1.3.15 or later. Note that the 1.4.x series remains vulnerable.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00042}

epss

{'score': 0.00034}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00039}

epss

{'score': 0.00042}


Fri, 03 Jan 2025 14:00:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 1.5.12 on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in  XML configuration files. Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12  on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in  XML configuration files.
References

Fri, 20 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Dec 2024 01:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}

threat_severity

Low


Thu, 19 Dec 2024 16:30:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 1.5.12 on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML. The attacks involves the modification of DOCTYPE declaration in  XML configuration files.
Title SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 2.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/V:D/U:Clear'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2025-01-03T13:40:41.135Z

Reserved: 2024-12-19T16:09:59.761Z

Link: CVE-2024-12801

cve-icon Vulnrichment

Updated: 2024-12-20T20:16:02.318Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-19T17:15:08.930

Modified: 2025-01-03T14:15:24.500

Link: CVE-2024-12801

cve-icon Redhat

Severity : Low

Publid Date: 2024-12-19T16:11:50Z

Links: CVE-2024-12801 - Bugzilla

cve-icon OpenCVE Enrichment

No data.