Miggo Logo

CVE-2023-26464:
Apache Log4j 1.x (EOL) allows Denial of Service (DoS)

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.233%
Published
3/10/2023
Updated
9/27/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.logging.log4j:log4j-coremaven>= 1.0.4, < 2.02.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly references Chainsaw and SocketAppender components handling deserialization of logging events. Both components use ObjectInputStream.readObject() to deserialize network data. In Log4j 1.x, these methods lack protections against deeply nested structures, enabling DoS via CWE-400 (resource exhaustion) and CWE-502 (untrusted deserialization). The functions identified are core entry points for event processing in these components.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

** UNSUPPORT** W**N *SSI*N** ** W**n usin* t** ***ins*w or So*k*t*pp*n**r *ompon*nts wit* Lo**j *.x on JR* l*ss t**n *.*, *n *tt**k*r t**t m*n***s to **us* * lo**in* *ntry involvin* * sp**i*lly-*r**t** (i* ***ply n*st**) **s*m*p or **s*t**l* (**p*n*i

Reasoning

T** vuln*r**ility *xpli*itly r***r*n**s ***ins*w *n* So*k*t*pp*n**r *ompon*nts **n*lin* **s*ri*liz*tion o* lo**in* *v*nts. *ot* *ompon*nts us* O*j**tInputStr**m.r***O*j**t() to **s*ri*liz* n*twork **t*. In Lo**j *.x, t**s* m*t*o*s l**k prot**tions **