{"vulnerability": "CVE-2024-12798", "sightings": [{"uuid": "bffec56e-5a41-4374-b027-6dfc32530a23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12798", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113680144577181941", "content": "", "creation_timestamp": "2024-12-19T15:15:47.215387Z"}, {"uuid": "4bb96995-4bc1-4555-813f-6609155babb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12798", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldobfj62zm2m", "content": "", "creation_timestamp": "2024-12-19T16:15:33.694197Z"}, {"uuid": "ab4e3c8e-bb92-468a-b55b-96d736b05067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12798", "type": "seen", "source": "https://t.me/cvedetector/13342", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12798 - Logback Core JaninoEventEvaluator Code Execution Armstrong\", \n  \"Content\": \"CVE ID : CVE-2024-12798 \nPublished : Dec. 19, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core  \n      upto and including version 1.5.12 in Java applications allows  \n      attacker to execute arbitrary code by compromising an existing  \n      logback configuration file or by injecting an environment variable  \n      before program execution.  \n  \n  \n  \n  \n  \nMalicious logback configuration files can allow the attacker to execute   \narbitrary code using the JaninoEventEvaluator extension.  \n  \n  \n  \nA successful attack requires the user to have write access to a   \nconfiguration file. Alternatively, the attacker could inject a malicious   \nenvironment variable pointing to a malicious configuration file. In both   \ncases, the attack requires existing privilege. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T18:09:50.000000Z"}]}