CVE-2019-17571

CRITICAL

Apache Log4j < 1.2.17 - Insecure Deserialization

Title source: rule

Description

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

Exploits (3)

nomisec WRITEUP 78 stars
by shadow-horse · poc
https://github.com/shadow-horse/CVE-2019-17571
nomisec SCANNER 39 stars
by HynekPetrak · poc
https://github.com/HynekPetrak/log4shell-finder
nomisec WORKING POC 1 stars
by Al1ex · poc
https://github.com/Al1ex/CVE-2019-17571

References (113)

... and 93 more

Scores

CVSS v3 9.8
EPSS 0.3696
EPSS Percentile 97.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-502
Status published
Products (29)
apache/bookkeeper < 4.14.3
apache/log4j < 1.2.17
canonical/ubuntu_linux 18.04
debian/debian_linux 8.0
debian/debian_linux 9.0
debian/debian_linux 10.0
log4j/log4j 1.2Maven
netapp/oncommand_system_manager 3.0 - 3.1.3
netapp/oncommand_workflow_automation
opensuse/leap 15.1
... and 19 more
Published Dec 20, 2019
Tracked Since Feb 18, 2026