Remote code execution vulnerability in Atlassian Confluence Server, IBM WebSphere Application Server and Apache Log4j - CVE-2021-44228ID: oval:org.secpod.oval:def:76369 | Date: (C)2021-12-13 (M)2023-12-14 |
Class: VULNERABILITY | Family: windows |
The host is installed with Atlassian Confluence Server with vulnerable log4j.properties, IBM webSphere application server 8.5.x before 8.5.5.21 or 9.0.x before 9.0.5.11 or Apache Log4j 2.0.x before 2.17.0 (excluding security releases 2.3.1, and 2.12.3) and is prone to a remote code execution vulnerability. A flaw is present in the application which fails to properly handle the issue in Log4j configuration file. Successful exploitation allows remote attackers to perform code execution.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Atlassian Confluence Server |
IBM WebSphere Application Server Network Deployment 9.0 |
IBM WebSphere Application Server Network Deployment 8.5 |
Apache Log4j |