<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for logback is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1082</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-01-24</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-01-24</InitialReleaseDate>
		<CurrentReleaseDate>2025-01-24</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-01-24</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">logback security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for logback is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Logback is intended as a successor to the popular log4j project.

Security Fix(es):

ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core
      upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows
      attacker to execute arbitrary code by compromising an existing
      logback configuration file or by injecting an environment variable
      before program execution.





Malicious logback configuration files can allow the attacker to execute 
arbitrary code using the JaninoEventEvaluator extension.



A successful attack requires the user to have write access to a 
configuration file. Alternatively, the attacker could inject a malicious 
environment variable pointing to a malicious configuration file. In both 
cases, the attack requires existing privilege.(CVE-2024-12798)

Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12  on the Java platform, allows an attacker to 
forge requests by compromising logback configuration files in XML.



The attacks involves the modification of DOCTYPE declaration in  XML configuration files.(CVE-2024-12801)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for logback is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">logback</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1082</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-12798</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-12801</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-12798</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-12801</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">logback-1.2.8-4.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-access-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">logback-access-1.2.8-4.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-examples-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">logback-examples-1.2.8-4.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-help-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">logback-help-1.2.8-4.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">logback-1.2.8-4.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-access-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">logback-access-1.2.8-4.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-examples-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">logback-examples-1.2.8-4.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-help-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">logback-help-1.2.8-4.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">logback-1.2.8-4.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-access-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">logback-access-1.2.8-4.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-examples-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">logback-examples-1.2.8-4.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-help-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">logback-help-1.2.8-4.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">logback-1.2.8-4.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-access-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">logback-access-1.2.8-4.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-examples-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">logback-examples-1.2.8-4.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-help-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">logback-help-1.2.8-4.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">logback-1.2.8-4.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-access-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">logback-access-1.2.8-4.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-examples-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">logback-examples-1.2.8-4.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="logback-help-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">logback-help-1.2.8-4.oe2403sp1.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">logback-1.2.8-4.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">logback-1.2.8-4.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">logback-1.2.8-4.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">logback-1.2.8-4.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="logback-1.2.8-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">logback-1.2.8-4.oe2403sp1.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core
      upto including version 0.1 to 1.3.14 and 1.4.0 to 1.5.12 in Java applications allows
      attacker to execute arbitrary code by compromising an existing
      logback configuration file or by injecting an environment variable
      before program execution.





Malicious logback configuration files can allow the attacker to execute 
arbitrary code using the JaninoEventEvaluator extension.



A successful attack requires the user to have write access to a 
configuration file. Alternatively, the attacker could inject a malicious 
environment variable pointing to a malicious configuration file. In both 
cases, the attack requires existing privilege.</Note>
		</Notes>
		<ReleaseDate>2025-01-24</ReleaseDate>
		<CVE>CVE-2024-12798</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.2</BaseScore>
				<Vector>AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>logback security update</Description>
				<DATE>2025-01-24</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1082</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12  on the Java platform, allows an attacker to 
forge requests by compromising logback configuration files in XML.



The attacks involves the modification of DOCTYPE declaration in  XML configuration files.</Note>
		</Notes>
		<ReleaseDate>2025-01-24</ReleaseDate>
		<CVE>CVE-2024-12801</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.0</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>logback security update</Description>
				<DATE>2025-01-24</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1082</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>