Skip to content

Conversation

@i5d6
Copy link

@i5d6 i5d6 commented Apr 27, 2025

The slf4j-log4j12:1.6.1 library is linked to Log4j 1.x.

Log4j version 1.x contains serious vulnerabilities, most notably the possibility of remote command execution (RCE) by serializing/deserializing untrusted data in components such as SocketServer, JMSSink, or when reading logs from an external source.

This version may allow serialized objects to be received over the network or files, which could lead to exploitation.

Simply put:

Using slf4j-log4j12:1.6.1 exposes you to serious vulnerabilities such as RCE due to mishandling of untrusted data during logging or networking operations.

The slf4j-log4j12:1.6.1 library is linked to Log4j 1.x.

Log4j version 1.x contains serious vulnerabilities, most notably the possibility of remote command execution (RCE) by serializing/deserializing untrusted data in components such as SocketServer, JMSSink, or when reading logs from an external source.

This version may allow serialized objects to be received over the network or files, which could lead to exploitation.

Simply put:

Using slf4j-log4j12:1.6.1 exposes you to serious vulnerabilities such as RCE due to mishandling of untrusted data during logging or networking operations.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant