CVE-2023-6378

ADVISORY - github

Summary

A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.

This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html

EPSS Score: 0.00652 (0.699)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Deserialization of Untrusted Data

ADVISORY - github

Deserialization of Untrusted Data

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Deserialization of Untrusted Data

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Serializable Class Containing Sensitive Data


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in