{"id":18929,"date":"2022-01-26T09:25:24","date_gmt":"2022-01-26T09:25:24","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=18929"},"modified":"2026-04-17T18:07:45","modified_gmt":"2026-04-17T18:07:45","slug":"apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/","title":{"rendered":"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>On January 19, NSFOCUS CERT detected that Apache released a security bulletin that disclosed three Log4j vulnerabilities, all of which affected the Apache Log4j 1.x version, and the official support and maintenance are no longer available. Please take measures as soon as possible to protect the relevant users.<\/p>\n\n\n\n<p><strong>Apache log4j JMSSink Deserialization Code Execution Vulnerability (CVE-2022-23302):<\/strong><\/p>\n\n\n\n<p>JMSSink in all versions of Log4j 1.x is vulnerable to untrusted data deserialization when an attacker has permission to modify the Log4j configuration or the configuration references an LDAP service that the attacker has access to. An attacker can provide a TopicConnectionFactoryBindingName configuration and leverage JMSSink to perform JNDI requests to remotely execute code in a manner similar to CVE-2021-4104. Log4j is not affected by this vulnerability when configured by default.<\/p>\n\n\n\n<p><strong>Apache log4j JDBCAppender SQL Injection Vulnerability (CVE-2022-23305):<\/strong><\/p>\n\n\n\n<p>Since JDBCAppender in Log4j 1.2.x accepts SQL statements as configuration parameters, PatternLayout&#8217;s message converter does not filter the values &acirc;&euro;&lsaquo;&acirc;&euro;&lsaquo;entered in it. An attacker can manipulate the SQL by constructing special strings into the content of the logging application input, thereby implementing illegal SQL queries. Log4j is not affected by this vulnerability when configured by default.<\/p>\n\n\n\n<p><strong>Apache log4j Chainsaw Deserialization Code Execution Vulnerability (CVE-2022-23307):<\/strong><\/p>\n\n\n\n<p>There is a deserialization problem in Chainsaw, the log viewer in Log4j 1.2.x, which may cause arbitrary code execution. The vulnerability was previously named CVE-2020-9493, and the official Apache Chainsaw 2.1.0 version has been released to fix it. Log4j is not configured to use Chainsaw by default.<\/p>\n\n\n\n<p>Chainsaw v2 is a supporting application for Log4j written by members of the Log4j development community. It is a GUI-based log viewer that can read log files in Log4j&#8217;s XMLLayout format.<\/p>\n\n\n\n<p>Reference links:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.mail-archive.com\/announce@apache.org\/msg07040.html\">https:\/\/www.mail-archive.com\/announce@apache.org\/msg07040.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.mail-archive.com\/announce@apache.org\/msg07041.html\">https:\/\/www.mail-archive.com\/announce@apache.org\/msg07041.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.mail-archive.com\/announce@apache.org\/msg07042.html\">https:\/\/www.mail-archive.com\/announce@apache.org\/msg07042.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected version<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apache&nbsp;Log4j&nbsp;1.x<\/li><li>Apache Chainsaw &lt; 2.1.0<\/li><\/ul>\n\n\n\n<p><strong>Unaffected version<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apache&Acirc;&nbsp;Log4j 2.x<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Detection<\/h2>\n\n\n\n<p><strong>Manual detection<\/strong><\/p>\n\n\n\n<p>Users who use Log4j 1.x version can check whether JMSSink, JDBCAppender, and Chainsaw are configured for use. If so, there are corresponding security risks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/01\/manual.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"663\" height=\"129\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/01\/manual.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18932\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/01\/manual.jpg 663w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/01\/manual-300x58.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/01\/manual-200x39.jpg 200w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official upgrade<\/strong><\/p>\n\n\n\n<p>The official has stopped maintaining the Log4j 1.x version in 2015. Please upgrade to Log4j 2 for security fixes. For migration methods, please refer to the official documentation:<\/p>\n\n\n\n<p><a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/manual\/migration.html\">https:\/\/logging.apache.org\/log4j\/2.x\/manual\/migration.html<\/a><\/p>\n\n\n\n<p>In view of the fact that Log4j2 has been exposed to multiple high-risk vulnerabilities recently, it is recommended to upgrade to the following security versions for protection:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Apache Log4j 2.17.1-rc1 (same as 2.17.1 stable)<\/li><li>Apache Log4j 2.12.4-rc1 (same as 2.12.4 stable)<\/li><li>Apache Log4j 2.3.2-rc1 (same as 2.3.2 stable)<\/li><\/ul>\n\n\n\n<p>Note: 2.17.1 supports Java 8 and above, 2.12.4 supports Java 7, and 2.3.2 supports Java 6.<\/p>\n\n\n\n<p>Official download link: <\/p>\n\n\n\n<p><a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/download.html\">https:\/\/logging.apache.org\/log4j\/2.x\/download.html<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/apache\/logging-log4j2\/tags\">https:\/\/github.com\/apache\/logging-log4j2\/tags<\/a><\/p>\n\n\n\n<p>For the Apache log4j Chainsaw deserialization code execution vulnerability (CVE-2022-23307), it can also be fixed by upgrading Apache Chainsaw to the latest version. The official download link: <a href=\"https:\/\/logging.apache.org\/chainsaw\/2.x\/download.html\">https:\/\/logging.apache.org\/chainsaw\/2.x\/download.html<\/a><\/p>\n\n\n\n<p><strong>Other mitigation<\/strong><\/p>\n\n\n\n<p>If the relevant users are temporarily unable to perform the upgrade operation, the following measures can be used to temporarily mitigate the above vulnerabilities:<\/p>\n\n\n\n<p>Apache log4j JMSSink Deserialization Code Execution Vulnerability (CVE-2022-23302) Temporary Protection:<\/p>\n\n\n\n<p>1) Comment out or delete the JMSSink in the Log4j configuration. <\/p>\n\n\n\n<p>2) Use the following command to delete the JMSSink class file from the log4j jar:<\/p>\n\n\n\n<p class=\"has-cyan-bluish-gray-background-color has-background\">zip -q -d log4j-*.jar org\/apache\/log4j\/net\/JMSSink.class<\/p>\n\n\n\n<p>3) Restrict system users&#8217; access to the application platform to prevent attackers from modifying Log4j&#8217;s configuration.<\/p>\n\n\n\n<p><strong><em>Apache log4j JDBCAppender SQL Injection Vulnerability (CVE-2022-23305) Temporary Protection:<\/em><\/strong><\/p>\n\n\n\n<p>Remove usage of JDBCAppender from Log4j&#8217;s configuration file<\/p>\n\n\n\n<p><strong><em>Apache log4j Chainsaw Deserialization Code Execution Vulnerability (CVE-2022-23307) Temporary Protection: <\/em><\/strong><\/p>\n\n\n\n<p>Do not configure Chainsaw to read serialized log events. Other receivers can be used, such as XMLSocketReceiver<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&acirc;&euro;&trade;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&acirc;&euro;&trade;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA). A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview On January 19, NSFOCUS CERT detected that Apache released a security bulletin that disclosed three Log4j vulnerabilities, all of which affected the Apache Log4j 1.x version, and the official support and maintenance are no longer available. Please take measures as soon as possible to protect the relevant users. Apache log4j JMSSink Deserialization Code Execution [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9701,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[72,221,222,223,498],"class_list":["post-18929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-apache","tag-cve-2022-23302","tag-cve-2022-23305","tag-cve-2022-23307","tag-log4j2-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On January 19, NSFOCUS CERT detected that Apache released a security bulletin that disclosed three Log4j vulnerabilities, all of which affected\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-26T09:25:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On January 19, NSFOCUS CERT detected that Apache released a security bulletin that disclosed three Log4j vulnerabilities, all of which affected\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\\\/CVE-2022-23305\\\/CVE-2022-23307) Alert\",\"datePublished\":\"2022-01-26T09:25:24+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/\"},\"wordCount\":930,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Apache.jpg\",\"keywords\":[\"Apache\",\"CVE-2022-23302\",\"CVE-2022-23305\",\"CVE-2022-23307\",\"Log4j2 vulnerability\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/\",\"name\":\"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\\\/CVE-2022-23305\\\/CVE-2022-23307) Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Apache.jpg\",\"datePublished\":\"2022-01-26T09:25:24+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Apache.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/Apache.jpg\",\"width\":366,\"height\":206,\"caption\":\"Apache\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\\\/CVE-2022-23305\\\/CVE-2022-23307) Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert - NSFOCUS","og_description":"Overview On January 19, NSFOCUS CERT detected that Apache released a security bulletin that disclosed three Log4j vulnerabilities, all of which affected","og_url":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/","og_site_name":"NSFOCUS","article_published_time":"2022-01-26T09:25:24+00:00","article_modified_time":"2026-04-17T18:07:45+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert - NSFOCUS","twitter_description":"Overview On January 19, NSFOCUS CERT detected that Apache released a security bulletin that disclosed three Log4j vulnerabilities, all of which affected","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert","datePublished":"2022-01-26T09:25:24+00:00","dateModified":"2026-04-17T18:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/"},"wordCount":930,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg","keywords":["Apache","CVE-2022-23302","CVE-2022-23305","CVE-2022-23307","Log4j2 vulnerability"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/","url":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/","name":"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg","datePublished":"2022-01-26T09:25:24+00:00","dateModified":"2026-04-17T18:07:45+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/Apache.jpg","width":366,"height":206,"caption":"Apache"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apache-log4j-deserialization-and-sql-injection-vulnerability-cve-2022-23302-cve-2022-23305-cve-2022-23307-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Apache log4j Deserialization and SQL Injection Vulnerability (CVE-2022-23302\/CVE-2022-23305\/CVE-2022-23307) Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=18929"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18929\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9701"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=18929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=18929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=18929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}