Apache Log4j is prone to remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. Failed exploits will result in denial-of-service conditions.
Apache Log4j 2.0-alpha1 through 2.8.1 are vulnerable.
Information
Apache Log4j 2.0-alpha1
References:
- CVE-2017-5645: Apache Log4j socket receiver deserialization vulnerability (Seclists.org)
- Add support for filtering input in TcpSocketServer and UdpSocketServer (Apache)
- Apache Homepage (Apache)
- Log4j Homepage (log4j)