ID CVE-2018-8088
Summary org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data.
References
Vulnerable Configurations
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.9:rc0:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.9:rc0:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.9:rc1:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.9:rc1:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.0:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.0:rc0:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.11:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.12:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.12:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.13:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.13:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.14:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.14:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.15:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.15:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.16:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.16:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.18:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.18:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.19:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.19:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.20:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.20:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.21:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.21:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.22:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.22:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.23:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.23:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.24:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.24:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.7.25:*:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.7.25:*:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.8.0:alpha0:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.8.0:alpha0:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.8.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.8.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.8.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.8.0:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.8.0:beta0:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.8.0:beta0:*:*:*:*:*:*
  • cpe:2.3:a:slf4j:slf4j-ext:1.8.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:slf4j:slf4j-ext:1.8.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.3.0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.3.0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.3.0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.3.0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.3.0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.3.0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.3.0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.3.0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 08-08-2019 - 13:15)
Impact:
Exploitability:
CWE CWE-502
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • bugzilla
    id 1548909
    title CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    • OR
      • AND
        • comment slf4j is earlier than 0:1.7.4-4.el7_4
          oval oval:com.redhat.rhsa:tst:20180592007
        • comment slf4j is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20180592008
      • AND
        • comment slf4j-javadoc is earlier than 0:1.7.4-4.el7_4
          oval oval:com.redhat.rhsa:tst:20180592005
        • comment slf4j-javadoc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20180592006
      • AND
        • comment slf4j-manual is earlier than 0:1.7.4-4.el7_4
          oval oval:com.redhat.rhsa:tst:20180592009
        • comment slf4j-manual is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20180592010
    rhsa
    id RHSA-2018:0592
    released 2018-03-26
    severity Important
    title RHSA-2018:0592: slf4j security update (Important)
  • rhsa
    id RHSA-2018:0582
  • rhsa
    id RHSA-2018:0627
  • rhsa
    id RHSA-2018:0628
  • rhsa
    id RHSA-2018:0629
  • rhsa
    id RHSA-2018:0630
  • rhsa
    id RHSA-2018:1247
  • rhsa
    id RHSA-2018:1248
  • rhsa
    id RHSA-2018:1249
  • rhsa
    id RHSA-2018:1251
  • rhsa
    id RHSA-2018:1323
  • rhsa
    id RHSA-2018:1447
  • rhsa
    id RHSA-2018:1448
  • rhsa
    id RHSA-2018:1449
  • rhsa
    id RHSA-2018:1450
  • rhsa
    id RHSA-2018:1451
  • rhsa
    id RHSA-2018:1525
  • rhsa
    id RHSA-2018:1575
  • rhsa
    id RHSA-2018:2143
  • rhsa
    id RHSA-2018:2419
  • rhsa
    id RHSA-2018:2420
  • rhsa
    id RHSA-2018:2669
  • rhsa
    id RHSA-2018:2930
rpms
  • slf4j-0:1.7.4-4.el7_4
  • slf4j-javadoc-0:1.7.4-4.el7_4
  • slf4j-manual-0:1.7.4-4.el7_4
refmap via4
bid 103737
misc
mlist
  • [infra-devnull] 20190321 [GitHub] [tika] dadoonet opened pull request #268: Update slf4j to 1.8.0-beta4
  • [infra-devnull] 20190321 [GitHub] [tika] grossws commented on issue #268: Update slf4j to 1.8.0-beta4
sectrack 1040627
Last major update 08-08-2019 - 13:15
Published 20-03-2018 - 16:29
Back to Top