Apache Chainsaw up to 2.0.x deserialization [CVE-2020-9493]

A vulnerability, which was classified as critical, has been found in Apache Chainsaw up to 2.0.x. Affected by this issue is an unknown code. Upgrading to version 2.1.0 eliminates this vulnerability.

Description:

A de-serialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.

Mitigation:

Don’t configure Chainsaw to read serialized log events. Use a different receiver, such as XMLSocketReceiver

Apache Chainsaw

Chainsaw is a Java-based graphical user interface software tool to view and analyze log files. It enables users to analyze logs specifically generated by the Log4j logging system. Chainsaw v2 is a companion application to Log4j and the latest release is Chainsaw v2. Chainsaw and Log4j are Open source projects under Apache Software Foundation. 

Chainsaw can be used where it relies on a combination equivalent to view/query/trace via a large trail of logging events. Chainsaw can read local and ssh-reachable regular text log files, as well as log files formatted in Log4j’s XMLLayout. Chainsaw can receive events over UDP and TCP, read events from a database, and can also process events generated by java.util.logging.

Some features of Chainsaw v2:

  1. View remote events 
  2. Saved Preferences
  3. Responsive 
  4. Tabs/Docking 
  5. Coloring  
  6. Dynamic and powerful filtering 
  7. Cyclic (can support a Cyclic-based model and is great for monitoring live applications)
  8. Built-in documentation and tutorial 

 

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

Description zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db)

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with