Loading HuntDB...

GHSA-vmfg-rjjm-rjrj

GitHub Security Advisory

QOS.ch Logback vulnerable to Deserialization of Untrusted Data

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.

Affected Packages

Maven ch.qos.logback:logback-classic
Affected versions: 0 (fixed in 1.2.0)
Maven ch.qos.logback:logback-core
Affected versions: 0 (fixed in 1.2.0)

Related CVEs

Key Information

GHSA ID
GHSA-vmfg-rjjm-rjrj
Published
June 7, 2021 4:07 PM
Last Modified
November 17, 2022 8:55 PM
CVSS Score
9.0 /10
Primary Ecosystem
Maven
Primary Package
ch.qos.logback:logback-classic
GitHub Reviewed
✓ Yes

Dataset

Last updated: October 1, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.