CVE-2023-6481: Logback is vulnerable to an attacker mounting a Denial-Of-Service attack by sending poisoned data
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53844%
CWE
-
Published
12/4/2023
Updated
12/8/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ch.qos.logback:logback-core | maven | = 1.4.13 | 1.4.14 |
| ch.qos.logback:logback-core | maven | = 1.3.13 | 1.3.14 |
| ch.qos.logback:logback-core | maven | = 1.2.12 | 1.2.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing initialization of the deserialization filter in HardenedObjectInputStream's constructor. The fix commit (7018a36) adds the missing initObjectFilter() call, and the accompanying test case demonstrates that without this fix, malicious HashSet structures could be deserialized (triggering HashDoS). The direct correlation between the missing filter initialization and the security test case confirms this as the root cause.