This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/logging-site.git
The following commit(s) were added to refs/heads/asf-staging by this push: new 4fa2516d Automatic Site Publish by Buildbot 4fa2516d is described below commit 4fa2516d34e052e2a4e633402e4e05e8a4460a6b Author: buildbot <us...@infra.apache.org> AuthorDate: Fri Aug 22 18:10:37 2025 +0000 Automatic Site Publish by Buildbot --- content/cyclonedx/vdr.xml | 116 ++++++++++++++++++++++++++++++- content/feed.xml | 2 +- content/security.html | 169 +++++++++++++++++++++++++++++++++++++++++++++- 3 files changed, 282 insertions(+), 5 deletions(-) diff --git a/content/cyclonedx/vdr.xml b/content/cyclonedx/vdr.xml index 110dc499..f9d382b1 100644 --- a/content/cyclonedx/vdr.xml +++ b/content/cyclonedx/vdr.xml @@ -40,11 +40,11 @@ <bom xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://cyclonedx.org/schema/bom/1.6" xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.6 https://cyclonedx.org/schema/bom-1.6.xsd" - version="3" + version="4" serialNumber="urn:uuid:dfa35519-9734-4259-bba1-3e825cf4be06"> <metadata> - <timestamp>2025-08-17T11:18:06Z</timestamp> + <timestamp>2025-08-22T07:31:10Z</timestamp> <manufacturer> <name>Apache Logging Services</name> <url>https://logging.apache.org</url> @@ -54,6 +54,9 @@ <!-- We add *dummy* components to refer to in `affects` blocks. This is necessary, since not all Log4j components have SBOMs associated with them. --> <components> + <component type="library" bom-ref="log4cxx"> + <name>Apache Log4cxx</name> + </component> <component type="library" bom-ref="pkg:maven/org.apache.logging.log4j/log4j-core?type=jar"> <group>org.apache.logging.log4j</group> <name>log4j-core</name> @@ -64,6 +67,115 @@ <vulnerabilities> + <vulnerability> + <id>CVE-2025-54813</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-54813</url> + </source> + <ratings> + <rating> + <source> + <name>NVD</name> + <url> + https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N + </url> + </source> + <score>6.3</score> + <severity>medium</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>117</cwe> + </cwes> + <description><![CDATA[When using `JSONLayout`, not all payload bytes are properly escaped. +If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. +This may prevent applications that consume these logs from correctly interpreting the information within them.]]></description> + <recommendation> + <![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> + <created>2025-08-22T07:31:10Z</created> + <published>2025-08-22T07:31:10Z</published> + <updated>2025-08-22T07:31:10Z</updated> + <credits> + <organizations> + <organization> + <name>Sovereign Tech Agency</name> + <url>https://www.sovereign.tech/</url> + </organization> + </organizations> + </credits> + <affects> + <target> + <ref>logcxx</ref> + <versions> + <version> + <range><![CDATA[vers:semver>=0.11.0|<1.5.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + + <vulnerability> + <id>CVE-2025-54812</id> + <source> + <name>NVD</name> + <url>https://nvd.nist.gov/vuln/detail/CVE-2025-54812</url> + </source> + <ratings> + <rating> + <source> + <name>NVD</name> + <url> + https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N + </url> + </source> + <score>2.1</score> + <severity>low</severity> + <method>CVSSv4</method> + <vector>AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N</vector> + </rating> + </ratings> + <cwes> + <cwe>117</cwe> + </cwes> + <description><![CDATA[When using `HTMLLayout`, logger names are not properly escaped when writing out to the HTML file. +If untrusted data is used to retrieve the name of a logger, an attacker could theoretically inject HTML or Javascript in order to hide information from logs or steal data from the user. +In order to activate this, the following sequence must occur: + +* Log4cxx is configured to use `HTMLLayout`. +* Logger name comes from an untrusted string. +* Logger with compromised name logs a message. +* User opens the generated HTML log file in their browser, leading to potential XSS. + +Because logger names are generally constant strings, we assess the impact to users as LOW.]]></description> + <recommendation> + <![CDATA[Users are recommended to upgrade to version `1.5.0`, which fixes the issue.]]></recommendation> + <created>2025-08-22T07:31:10Z</created> + <published>2025-08-22T07:31:10Z</published> + <updated>2025-08-22T07:31:10Z</updated> + <credits> + <organizations> + <organization> + <name>Sovereign Tech Agency</name> + <url>https://www.sovereign.tech/</url> + </organization> + </organizations> + </credits> + <affects> + <target> + <ref>logcxx</ref> + <versions> + <version> + <range><![CDATA[vers:semver<1.5.0]]></range> + </version> + </versions> + </target> + </affects> + </vulnerability> + <vulnerability> <id>CVE-2021-44832</id> <source> diff --git a/content/feed.xml b/content/feed.xml index 926e715b..7b300403 100644 --- a/content/feed.xml +++ b/content/feed.xml @@ -1,4 +1,4 @@ -<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="/feed.xml" rel="self" type="application/atom+xml" /><link href="/" rel="alternate" type="text/html" /><updated>2025-08-22T06:47:02+00:00</updated><id>/feed.xml</id><title type="html">Apache Software Foundation - Logging Services</title><subtitle>Write an awesome description for your new site here. You can edit this line in _ [...] +<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="/feed.xml" rel="self" type="application/atom+xml" /><link href="/" rel="alternate" type="text/html" /><updated>2025-08-22T18:10:36+00:00</updated><id>/feed.xml</id><title type="html">Apache Software Foundation - Logging Services</title><subtitle>Write an awesome description for your new site here. You can edit this line in _ [...] <p>A <strong>Vulnerability Exploitability eXchange (VEX)</strong> is a machine-readable file used to indicate whether vulnerabilities in an application’s third-party dependencies are actually exploitable.</p> diff --git a/content/security.html b/content/security.html index af4eabe4..9ce7f2fe 100644 --- a/content/security.html +++ b/content/security.html @@ -429,14 +429,179 @@ We choose to pool all information on this one page, allowing easy searching for </td> <td class="content"> <div class="paragraph"> -<p>We adhere to <a href="https://maven.apache.org/enforcer/enforcer-rules/versionRanges.html">the Maven version range syntax</a> while sharing versions of affected components. -We only extend this mathematical notation with set union operator (i.e., <code>∪</code>) to denote union of multiple ranges.</p> +<p>Version ranges follow the <a href="https://github.com/package-url/vers-spec/blob/main/VERSION-RANGE-SPEC.rst">VERS specification</a>:</p> +</div> +<div class="ulist"> +<ul> +<li> +<p>Log4cxx: <code>semver</code> scheme</p> +</li> +<li> +<p>Log4j: <code>maven</code> scheme</p> +</li> +<li> +<p>Log4net: <code>nuget</code> scheme</p> +</li> +</ul> +</div> +<div class="paragraph"> +<p>For brevity, mathematical interval notation is used, with the union operator (<code>∪</code>) to represent multiple ranges.</p> </div> </td> </tr> </table> </div> <div class="sect2"> +<h3 id="CVE-2025-54813"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54812">CVE-2025-54813</a></h3> +<table class="tableblock frame-all grid-all stretch"> +<colgroup> +<col style="width: 16.6666%;"> +<col style="width: 83.3334%;"> +</colgroup> +<tbody> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Summary</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock">Improper escaping with JSONLayout</p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">CVSS 4.x Score & Vector</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock">6.3 MEDIUM (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N)</p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Components affected</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock">Apache Log4cxx</p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Versions affected</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[0.11.0, 1.5.0)</code></p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Versions fixed</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>1.5.0</code></p></td> +</tr> +</tbody> +</table> +<div class="sect3"> +<h4 id="CVE-2025-54813-description">Description</h4> +<div class="paragraph"> +<p>When using <code>JSONLayout</code>, not all payload bytes are properly escaped. +If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. +This may prevent applications that consume these logs from correctly interpreting the information within them.</p> +</div> +</div> +<div class="sect3"> +<h4 id="CVE-2025-54813-remediation">Remediation</h4> +<div class="paragraph"> +<p>Users are recommended to upgrade to version <code>1.5.0</code>, which fixes the issue.</p> +</div> +</div> +<div class="sect3"> +<h4 id="CVE-2025-54813-credits">Credits</h4> +<div class="paragraph"> +<p>This issue was discovered and remediated with support from the Sovereign Tech Agency, through the <a href="https://yeswehack.com/programs/log4j-bug-bounty-program">Apache Log4j Bug Bounty Program on YesWeHack</a>.</p> +</div> +</div> +<div class="sect3"> +<h4 id="CVE-2025-54813-references">References</h4> +<div class="ulist"> +<ul> +<li> +<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54813">CVE-2025-54813</a></p> +</li> +<li> +<p><a href="https://github.com/apache/logging-log4cxx/pull/512">Pull request that fixes the issue</a></p> +</li> +</ul> +</div> +</div> +</div> +<div class="sect2"> +<h3 id="CVE-2025-54812"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54812">CVE-2025-54812</a></h3> +<table class="tableblock frame-all grid-all stretch"> +<colgroup> +<col style="width: 16.6666%;"> +<col style="width: 83.3334%;"> +</colgroup> +<tbody> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Summary</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock">Improper HTML escaping in HTMLLayout</p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">CVSS 4.x Score & Vector</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock">2.1 LOW (CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N)</p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Components affected</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock">Apache Log4cxx</p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Versions affected</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[0, 1.5.0)</code></p></td> +</tr> +<tr> +<th class="tableblock halign-left valign-top"><p class="tableblock">Versions fixed</p></th> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>1.5.0</code></p></td> +</tr> +</tbody> +</table> +<div class="sect3"> +<h4 id="CVE-2025-54812-description">Description</h4> +<div class="paragraph"> +<p>When using <code>HTMLLayout</code>, logger names are not properly escaped when writing out to the HTML file. +If untrusted data is used to retrieve the name of a logger, an attacker could theoretically inject HTML or Javascript in order to hide information from logs or steal data from the user. +In order to activate this, the following sequence must occur:</p> +</div> +<div class="ulist"> +<ul> +<li> +<p>Log4cxx is configured to use <code>HTMLLayout</code>.</p> +</li> +<li> +<p>Logger name comes from an untrusted string.</p> +</li> +<li> +<p>Logger with compromised name logs a message.</p> +</li> +<li> +<p>User opens the generated HTML log file in their browser, leading to potential XSS.</p> +</li> +</ul> +</div> +<div class="paragraph"> +<p>Because logger names are generally constant strings, we assess the impact to users as LOW.</p> +</div> +</div> +<div class="sect3"> +<h4 id="CVE-2025-54812-remediation">Remediation</h4> +<div class="paragraph"> +<p>Users are recommended to upgrade to version <code>1.5.0</code>, which fixes the issue.</p> +</div> +</div> +<div class="sect3"> +<h4 id="CVE-2025-54812-credits">Credits</h4> +<div class="paragraph"> +<p>This issue was discovered and remediated with support from the Sovereign Tech Agency, through the <a href="https://yeswehack.com/programs/log4j-bug-bounty-program">Apache Log4j Bug Bounty Program on YesWeHack</a>.</p> +</div> +</div> +<div class="sect3"> +<h4 id="CVE-2025-54812-references">References</h4> +<div class="ulist"> +<ul> +<li> +<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54812">CVE-2025-54812</a></p> +</li> +<li> +<p><a href="https://github.com/apache/logging-log4cxx/pull/509">Pull request #509</a></p> +</li> +<li> +<p><a href="https://github.com/apache/logging-log4cxx/pull/514">Pull request #514</a></p> +</li> +</ul> +</div> +</div> +</div> +<div class="sect2"> <h3 id="CVE-2021-44832"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832">CVE-2021-44832</a></h3> <table class="tableblock frame-all grid-all stretch"> <colgroup>