Home » Database

AVID-2026-R0928

Description

Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration (CVE-2021-44832)

Details

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

Reason for inclusion in AVID: CVE-2021-44832 describes a remote code execution vulnerability in Apache Log4j2 (JDBC Appender with LDAP data source). This is a software vulnerability in a widely used library that can be part of AI system deployment stacks (depends on Java components, logging, and data processing pipelines). Therefore it concerns AI/ML software, affects components used to build/deploy AI systems, is a security/vulnerability issue, and has sufficient evidence in the report.

References

Affected or Relevant Artifacts

  • Developer: Apache Software Foundation
  • Deployer: Apache Software Foundation
  • Artifact Details:
TypeName
SystemApache Log4j2

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-20CWE-20 Improper Input Validation
CWE-74CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-12-28
  • Version: 0.3.3
  • AVID Entry