Miggo Logo

CVE-2019-17571:
Log4j 1.2 SocketServer Vulnerable to Deserialization Remote Code Execution

9.8

CVSS Score

Basic Information

EPSS Score
-
Published
1/6/2020
Updated
10/12/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
log4j:log4jmaven>= 1.2, <= 1.2.17
org.zenframework.z8.dependencies.commons:log4j-1.2.17maven= 2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The SocketServer class in Log4j 1.2 is identified as vulnerable to deserialization attacks. Methods within this class that handle deserialization are likely the points of vulnerability. The exact method names are not provided but would be related to deserialization and handling of incoming log data.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In*lu*** in Lo**j *.* is * So*k*tS*rv*r *l*ss t**t is vuln*r**l* to **s*ri*liz*tion o* untrust** **t* w*i** **n ** *xploit** to r*mot*ly *x**ut* *r*itr*ry *o** w**n *om*in** wit* * **s*ri*liz*tion *****t w**n list*nin* to untrust** n*twork tr***i* *o

Reasoning

T** So*k*tS*rv*r *l*ss in Lo**j *.* is i**nti*i** *s vuln*r**l* to **s*ri*liz*tion *tt**ks. M*t*o*s wit*in t*is *l*ss t**t **n*l* **s*ri*liz*tion *r* lik*ly t** points o* vuln*r**ility. T** *x**t m*t*o* n*m*s *r* not provi*** *ut woul* ** r*l*t** to