Apache Chainsaw up to 2.0.x deserialization [CVE-2020-9493]

A vulnerability, which was classified as critical, has been found in Apache Chainsaw up to 2.0.x. Affected by this issue is an unknown code. Upgrading to version 2.1.0 eliminates this vulnerability.

Description:

A de-serialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.

Mitigation:

Don’t configure Chainsaw to read serialized log events. Use a different receiver, such as XMLSocketReceiver

Apache Chainsaw

Chainsaw is a Java-based graphical user interface software tool to view and analyze log files. It enables users to analyze logs specifically generated by the Log4j logging system. Chainsaw v2 is a companion application to Log4j and the latest release is Chainsaw v2. Chainsaw and Log4j are Open source projects under Apache Software Foundation. 

Chainsaw can be used where it relies on a combination equivalent to view/query/trace via a large trail of logging events. Chainsaw can read local and ssh-reachable regular text log files, as well as log files formatted in Log4j’s XMLLayout. Chainsaw can receive events over UDP and TCP, read events from a database, and can also process events generated by java.util.logging.

Some features of Chainsaw v2:

  1. View remote events 
  2. Saved Preferences
  3. Responsive 
  4. Tabs/Docking 
  5. Coloring  
  6. Dynamic and powerful filtering 
  7. Cyclic (can support a Cyclic-based model and is great for monitoring live applications)
  8. Built-in documentation and tutorial 

 

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2023-3065 : MOBATIME AMXGT100 UP TO 1.3.20 IMPROPER AUTHENTICATION

CVE-2023-3065 : MOBATIME AMXGT100 UP TO 1.3.20 IMPROPER AUTHENTICATION

Description Improper Authentication vulnerability in Mobatime mobile application AMXGT100 allows Authentication Bypass.This issue affects Mobatime mobile application AMXGT100 through 1.3.20.

CVE-2023-2781 : USER EMAIL VERIFICATION FOR WOOCOMMERCE PLUGIN UP TO 3.5.0 ON WORDPRESS IMPROPER AUTHENTICATION

CVE-2023-2781 : USER EMAIL VERIFICATION FOR WOOCOMMERCE PLUGIN UP TO 3.5.0 ON WORDPRESS IMPROPER AUTHENTICATION

Description The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up

CVE-2023-33965 : BROOK PRIOR 20230606 TPROXY SERVER OS COMMAND INJECTION

CVE-2023-33965 : BROOK PRIOR 20230606 TPROXY SERVER OS COMMAND INJECTION

Description Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker