[ 
https://issues.apache.org/jira/browse/ATLAS-5155?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Madhan Neethiraj reassigned ATLAS-5155:
---------------------------------------

    Assignee: Abhinav Chandel

> Fix logback-core vulnerability due to CVE-2025-11226
> ----------------------------------------------------
>
>                 Key: ATLAS-5155
>                 URL: https://issues.apache.org/jira/browse/ATLAS-5155
>             Project: Atlas
>          Issue Type: Improvement
>            Reporter: Abhinav Chandel
>            Assignee: Abhinav Chandel
>            Priority: Major
>          Time Spent: 10m
>  Remaining Estimate: 0h
>
> {*}CVE-2025-11226{*}:
> ACE vulnerability in conditional configuration file processing by QOS.CH 
> logback-core up to and including version 1.5.18 in Java applications, allows 
> an attacker to execute arbitrary code by compromising an existing logback 
> configuration file or by injecting an environment variable before program 
> execution. A successful attack requires the presence of Janino library and 
> Spring Framework to be present on the user's class path. In addition, the 
> attacker must have write access to a configuration file. Alternatively, the 
> attacker could inject a malicious environment variable pointing to a 
> malicious configuration file. In both cases, the attack requires existing 
> privilege.
> CVSS Score: 5.9 (MEDIUM)
> [https://nvd.nist.gov/vuln/detail/CVE-2025-11226]
> *Affected Packages:*
>  * Package: ch.qos.logback:logback-core



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to