-
Notifications
You must be signed in to change notification settings - Fork 214
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-6378 (High) detected in logback-classic-1.2.12.jar #3729
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Milestone
Comments
mend-for-github-com
bot
added
the
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
label
Nov 30, 2023
dlvenable
added a commit
to dlvenable/data-prepper
that referenced
this issue
Dec 1, 2023
…. Resolves opensearch-project#3729 Signed-off-by: David Venable <[email protected]>
4 tasks
dlvenable
added a commit
to dlvenable/data-prepper
that referenced
this issue
Dec 1, 2023
…. Resolves opensearch-project#3729 Signed-off-by: David Venable <[email protected]>
dlvenable
added a commit
that referenced
this issue
Dec 6, 2023
Use Logback 1.4.12 in the performance test project to fix CVE-2023-6378. Resolves #3729 Use Logback 1.4.12 in the sample analytics project to fix CVE-2023-6378. Resolves #3729 Signed-off-by: David Venable <[email protected]>
github-project-automation
bot
moved this from Unplanned
to Done
in Data Prepper Tracking Board
Dec 6, 2023
opensearch-trigger-bot bot
pushed a commit
that referenced
this issue
Dec 6, 2023
Use Logback 1.4.12 in the performance test project to fix CVE-2023-6378. Resolves #3729 Use Logback 1.4.12 in the sample analytics project to fix CVE-2023-6378. Resolves #3729 Signed-off-by: David Venable <[email protected]> (cherry picked from commit ea8e330)
dlvenable
added a commit
that referenced
this issue
Dec 6, 2023
… (#3811) Use Logback 1.4.12 in the performance test project to fix CVE-2023-6378. Resolves #3729 Use Logback 1.4.12 in the sample analytics project to fix CVE-2023-6378. Resolves #3729 Signed-off-by: David Venable <[email protected]> (cherry picked from commit ea8e330) Co-authored-by: David Venable <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
CVE-2023-6378 - High Severity Vulnerability
Vulnerable Library - logback-classic-1.2.12.jar
logback-classic module
Library home page: http://logback.qos.ch
Path to dependency file: /performance-test/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/ch.qos.logback/logback-classic/1.2.12/d4dee19148dccb177a0736eb2027bd195341da78/logback-classic-1.2.12.jar
Dependency Hierarchy:
Found in HEAD commit: 90bdaa7e7833bdd504c817e49d4434b4d8880f56
Found in base branch: main
Vulnerability Details
A serialization vulnerability in logback receiver component part of
logback version 1.4.11 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.
Publish Date: 2023-11-29
URL: CVE-2023-6378
CVSS 3 Score Details (7.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://logback.qos.ch/news.html#1.3.12
Release Date: 2023-11-29
Fix Resolution: ch.qos.logback:logback-classic:1.3.12,1.4.12
The text was updated successfully, but these errors were encountered: