漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Apache Log4cxx: Improper HTML escaping in HTMLLayout
Vulnerability Description
Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using HTMLLayout, logger names are not properly escaped when writing out to the HTML file. If untrusted data is used to retrieve the name of a logger, an attacker could theoretically inject HTML or Javascript in order to hide information from logs or steal data from the user. In order to activate this, the following sequence must occur: * Log4cxx is configured to use HTMLLayout. * Logger name comes from an untrusted string * Logger with compromised name logs a message * User opens the generated HTML log file in their browser, leading to potential XSS Because logger names are generally constant strings, we assess the impact to users as LOW This issue affects Apache Log4cxx: before 1.5.0. Users are recommended to upgrade to version 1.5.0, which fixes the issue.
CVSS Information
N/A
Vulnerability Type
日志输出的转义处理不恰当
Vulnerability Title
Apache Log4cxx 安全漏洞
Vulnerability Description
Apache Log4cxx是美国阿帕奇(Apache)基金会的一个以 Apache log4j 为模式的 C++ 日志框架。 Apache Log4cxx 1.5.0之前版本存在安全漏洞,该漏洞源于HTMLLayout未正确转义记录器名称,可能导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A