Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.splunk.logging/splunk-library-javalogging
  4. ›
  5. GHSA-94g7-hpv8-h9qm

GHSA-94g7-hpv8-h9qm: Remote code injection in Log4j

December 14, 2021 (updated August 7, 2025)

Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input.

More Details: https://github.com/advisories/GHSA-jfh8-c2jp-5v3q

References

  • github.com/advisories/GHSA-94g7-hpv8-h9qm
  • github.com/splunk/splunk-library-javalogging
  • github.com/splunk/splunk-library-javalogging/security/advisories/GHSA-94g7-hpv8-h9qm

Code Behaviors & Features

Detect and mitigate GHSA-94g7-hpv8-h9qm with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.6.2-0-0, all versions starting from 1.7.0 before 1.11.1

Fixed versions

  • 1.11.1
  • 1.6.2-0-0

Solution

Upgrade to versions 1.11.1, 1.6.2-0-0 or above.

Source file

maven/com.splunk.logging/splunk-library-javalogging/GHSA-94g7-hpv8-h9qm.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:19:04 +0000.