Uploaded image for project: 'Dev - Nexus Repo'
  1. Dev - Nexus Repo
  2. NEXUS-13865

protect against potential for logback exploit CVE-2017-5929

    XMLWordPrintable

    Details

    • Type: Bug
    • Status: Closed
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: 2.14.4
    • Fix Version/s: 2.14.5
    • Component/s: Logging
    • Labels:
    • Release Note:
      Yes

      Description

      Nexus Repository Manager versions earlier than 2.14.5 MAY be affected. See below for exact details.


      Issue
      CVE-2017-5929

      Source
      National Vulnerability Database

      Severity
      Sonatype CVSS 3.0: 9.8

      Weakness
      Sonatype CWE: 502
      Description from CVE
      Reserved CVE.
      Explanation
      The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects. An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized.

      Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components.

      Advisory Deviation Notice: The Sonatype Security Research team discovered that this vulnerability was first introduced in version 0.3.0 of logback-classic and version 0.6.0 of logback-access, as opposed to being present in all versions prior to 1.2.0, as stated in the advisory.

      Detection
      The application is vulnerable by using this component.

      Recommendation
      We recommend upgrading to a version of this component that is not vulnerable to this specific issue.

      Categories
      Data

      Root Cause
      logback-classic-1.1.2.jar <= SocketNode.class : [1.0.12,1.2.0)
      logback-classic-1.1.2.jar <= RemoteAppenderStreamClient.class : [1.0.12,1.2.0)

      Advisories
      Project: https://logback.qos.ch/news.html

      Nexus Repository Manager Specific Analysis

      Nexus 3.x: Because NX3 ships with a modified and repackaged logback bundle (derived from the pax-logging project) it doesn't appear to be affected.

      Nexus 2.x: Regarding the actual CVE, the out-of-the-box logback configuration we ship with is not vulnerable. The issue may be applicable if an installation of Nexus added a "receiver" to the logback configuration: https://logback.qos.ch/manual/receivers.html , however doing so would be outside the scope of something Sonatype would advise doing and we have no known installations with such a configuration.

      Nexus Repository Manager 2.14.5 ships with a version of logback not vulnerable.

        Attachments

          Issue Links

            Activity

              People

              • Assignee:
                Unassigned
                Reporter:
                plynch Peter Lynch
                Last Updated By:
                Peter Lynch
              • Votes:
                0 Vote for this issue
                Watchers:
                1 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: