[
https://issues.apache.org/jira/browse/AMBARI-26306?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Jialiang Cai resolved AMBARI-26306.
-----------------------------------
Fix Version/s: 3.0.0
Resolution: Fixed
> Bumpup logback to 1.5.16(latest) due to CVE's
> ---------------------------------------------
>
> Key: AMBARI-26306
> URL: https://issues.apache.org/jira/browse/AMBARI-26306
> Project: Ambari
> Issue Type: Improvement
> Reporter: Basapuram Kumar
> Priority: Major
> Fix For: 3.0.0
>
> Time Spent: 40m
> Remaining Estimate: 0h
>
> Currenlty Ambari is using 1.2.13 version of logback-classic & logback-core,
> which is the vulnerable to following CVE's
>
> {{[CVE-2024-12801|https://nvd.nist.gov/vuln/detail/CVE-2024-12801] }}
> {{[CVE-2024-12798|https://nvd.nist.gov/vuln/detail/CVE-2024-12798] }}
> {{Description of the above CVE;s}}
> {{```}}
> ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core upto
> including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications
> allows attacker to execute arbitrary code by compromising an existing logback
> configuration file or by injecting an environment variable before program
> execution. Malicious logback configuration files can allow the attacker to
> execute arbitrary code using the JaninoEventEvaluator extension. A successful
> attack requires the user to have write access to a configuration file.
> Alternatively, the attacker could inject a malicious environment variable
> pointing to a malicious configuration file. In both cases, the attack
> requires existing privilege.
> ```
>
> {{So suggesting to upgrade to latest version, which is 1.5.16, which is
> compiled in jdk-11, should be able to compatible.}}
>
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]