Remote code execution vulnerability in Apache Log4j - CVE-2021-44832Deprecated |
ID: oval:org.secpod.oval:def:76620 | Date: (C)2021-12-29 (M)2023-11-13 |
Class: VULNERABILITY | Family: windows |
The host is installed with Apache Log4j 2.0.x through 2.17.0 (excluding security releases 2.3.2 and 2.12.4) and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle an issue in the logging configuration file. Successful exploitation could allow attackers to construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code.
Platform: |
Microsoft Windows Server 2008 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2022 |
Microsoft Windows 10 |
Microsoft Windows 11 |