Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2018-1285
Apache log4net versions before 2.0.10 do not disable XML external entities when parsing log4net configuration files. This allows for XXE-based attacks in applications that accept attacker-controlled log4net configuration files.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.49
EPSS Ranking
97.6%
CVSS Severity
CVSS v3 Score
9.8
CVSS v2 Score
7.5
References
https://issues.apache.org/jira/browse/LOG4NET-575
https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/
https://security.netapp.com/advisory/ntap-20220909-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://issues.apache.org/jira/browse/LOG4NET-575
https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d%40%3Cdev.logging.apache.org%3E
https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/
https://security.netapp.com/advisory/ntap-20220909-0001/
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
Products affected by CVE-2018-1285
Apache
»
Log4net
»
Version:
N/A
cpe:2.3:a:apache:log4net:-
Apache
»
Log4net
»
Version:
1.2.10
cpe:2.3:a:apache:log4net:1.2.10
Apache
»
Log4net
»
Version:
1.2.11
cpe:2.3:a:apache:log4net:1.2.11
Apache
»
Log4net
»
Version:
1.2.12
cpe:2.3:a:apache:log4net:1.2.12
Apache
»
Log4net
»
Version:
1.2.13
cpe:2.3:a:apache:log4net:1.2.13
Apache
»
Log4net
»
Version:
1.2.15
cpe:2.3:a:apache:log4net:1.2.15
Apache
»
Log4net
»
Version:
1.2.9_beta
cpe:2.3:a:apache:log4net:1.2.9_beta
Apache
»
Log4net
»
Version:
2.0.6
cpe:2.3:a:apache:log4net:2.0.6
Apache
»
Log4net
»
Version:
2.0.7
cpe:2.3:a:apache:log4net:2.0.7
Apache
»
Log4net
»
Version:
2.0.8
cpe:2.3:a:apache:log4net:2.0.8
Netapp
»
Manageability Software Development Kit
»
Version:
N/A
cpe:2.3:a:netapp:manageability_software_development_kit:-
Netapp
»
Snapcenter
»
Version:
N/A
cpe:2.3:a:netapp:snapcenter:-
Oracle
»
Application Testing Suite
»
Version:
13.3.0.1
cpe:2.3:a:oracle:application_testing_suite:13.3.0.1
Oracle
»
Hospitality Opera 5
»
Version:
5.5
cpe:2.3:a:oracle:hospitality_opera_5:5.5
Oracle
»
Hospitality Opera 5
»
Version:
5.6
cpe:2.3:a:oracle:hospitality_opera_5:5.6
Oracle
»
Hospitality Simphony
»
Version:
18.2.7.2
cpe:2.3:a:oracle:hospitality_simphony:18.2.7.2
Oracle
»
Hospitality Simphony
»
Version:
19.1.3
cpe:2.3:a:oracle:hospitality_simphony:19.1.3
Fedoraproject
»
Fedora
»
Version:
30
cpe:2.3:o:fedoraproject:fedora:30
Fedoraproject
»
Fedora
»
Version:
31
cpe:2.3:o:fedoraproject:fedora:31
Fedoraproject
»
Fedora
»
Version:
32
cpe:2.3:o:fedoraproject:fedora:32
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved