CVE-2022-23305 (CNNVD-202201-1421)

CRITICAL
中文标题:
Apache Log4j SQL注入漏洞
英文标题:
SQL injection in JDBC Appender in Apache Log4j V1
CVSS分数: 9.8
发布时间: 2022-01-18 15:25:22
漏洞类型: SQL注入
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4j 存在SQL注入漏洞,该漏洞源于 Log4j 1.2.x 中的 JDBCAppender 接受 SQL 语句作为配置参数,其中要插入的值是来自 PatternLayout 的转换器。 消息转换器 %m 可能总是包含在内。 这允许攻击者通过将精心制作的字符串输入到记录的应用程序的输入字段或标题中来操纵 SQL,从而允许执行意外的 SQL 查询。 请注意,此问题仅在专门配置为使用 JDBCAppender(不是默认设置)时才会影响 Log4j 1.x。 从 2.0-beta8 版本开始,重新引入了 JDBCAppender,适当支持参数化 SQL 查询,并进一步自定义写入日志的列。 Apache Log4j 1.2 已于 2015 年 8 月结束生命周期。用户应升级到 Log4j 2,因为它解决了以前版本中的许多其他问题。

英文描述:

By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.

CWE类型:
CWE-89
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Apache Software Foundation Apache Log4j 1.x - < unspecified - cpe:2.3:a:apache_software_foundation:apache_log4j_1.x_:*:*:*:*:*:*:*:*
apache log4j * - - cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
netapp snapmanager - - - cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
broadcom brocade_sannav - - - cpe:2.3:a:broadcom:brocade_sannav:-:*:*:*:*:*:*:*
qos reload4j * - - cpe:2.3:a:qos:reload4j:*:*:*:*:*:*:*:*
oracle advanced_supply_chain_planning 12.1 - - cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*
oracle advanced_supply_chain_planning 12.2 - - cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*
oracle business_intelligence 5.9.0.0.0 - - cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*
oracle business_intelligence 12.2.1.3.0 - - cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*
oracle business_intelligence 12.2.1.4.0 - - cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*
oracle business_process_management_suite 12.2.1.3.0 - - cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
oracle business_process_management_suite 12.2.1.4.0 - - cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*
oracle communications_eagle_ftp_table_base_retrieval 4.5 - - cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*
oracle communications_instant_messaging_server 10.0.1.5.0 - - cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*
oracle communications_messaging_server 8.1 - - cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
oracle communications_network_integrity 7.3.6 - - cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
oracle communications_offline_mediation_controller * - - cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*
oracle communications_offline_mediation_controller 12.0.0.5.0 - - cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*
oracle communications_unified_inventory_management 7.4.1 - - cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
oracle communications_unified_inventory_management 7.4.2 - - cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*
oracle e-business_suite_cloud_manager_and_cloud_backup_module * - - cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:*:*:*:*:*:*:*:*
oracle e-business_suite_cloud_manager_and_cloud_backup_module 2.2.1.1.1 - - cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*
oracle e-business_suite_information_discovery * - - cpe:2.3:a:oracle:e-business_suite_information_discovery:*:*:*:*:*:*:*:*
oracle enterprise_manager_base_platform 13.4.0.0 - - cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
oracle enterprise_manager_base_platform 13.5.0.0 - - cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*
oracle financial_services_revenue_management_and_billing_analytics 2.7.0.0 - - cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*
oracle financial_services_revenue_management_and_billing_analytics 2.7.0.1 - - cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*
oracle financial_services_revenue_management_and_billing_analytics 2.8.0.0 - - cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*
oracle healthcare_foundation 8.1.0 - - cpe:2.3:a:oracle:healthcare_foundation:8.1.0:*:*:*:*:*:*:*
oracle hyperion_data_relationship_management * - - cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*
oracle hyperion_infrastructure_technology * - - cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*
oracle identity_management_suite 12.2.1.3.0 - - cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
oracle identity_management_suite 12.2.1.4.0 - - cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*
oracle identity_manager_connector 11.1.1.5.0 - - cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*
oracle jdeveloper 12.2.1.3.0 - - cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*
oracle middleware_common_libraries_and_tools 12.2.1.4.0 - - cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*
oracle mysql_enterprise_monitor * - - cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
oracle retail_extract_transform_and_load 13.2.5 - - cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*
oracle tuxedo 12.2.2.0.0 - - cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*
oracle weblogic_server 12.2.1.3.0 - - cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
oracle weblogic_server 12.2.1.4.0 - - cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
oracle weblogic_server 14.1.1.0.0 - - cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
[oss-security] 20220118 CVE-2022-23305: SQL injection in JDBC Appender in Apache Log4j V1 mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
CVSS评分详情
9.8
CRITICAL
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS版本: 3.1
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2022-01-18 15:25:22
修改时间:
2024-08-03 03:36:20
创建时间:
2025-11-11 15:37:20
更新时间:
2025-11-11 15:57:04
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2022-23305 2025-11-11 15:21:18 2025-11-11 07:37:20
NVD nvd_CVE-2022-23305 2025-11-11 14:58:13 2025-11-11 07:45:36
CNNVD cnnvd_CNNVD-202201-1421 2025-11-11 15:10:48 2025-11-11 07:57:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:57:04
vulnerability_type: 未提取 → SQL注入; cnnvd_id: 未提取 → CNNVD-202201-1421; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> SQL注入
  • cnnvd_id: 未提取 -> CNNVD-202201-1421
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:36
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.8; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 2 → 42; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.8
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 2 -> 42
  • data_sources: ['cve'] -> ['cve', 'nvd']