I'm really struggeling with understanding CVE-2021-42550. Logback says:
A successul RCE attack with CVE-2021-42550 requires all of the following conditions to be met:
- write access to logback.xml
- use of versions < 1.2.9
- reloading of poisoned configuration data, which implies application restart or scan="true" set prior to attack.
As an additional extra precaution, in addition to upgrading to logback version 1.2.9, we also recommend users to set their logback configuration files as read-only.
But those conditions explain how one is using applications. It's nothing unusual. And if someone is able to change (configuration) files and the application is restarted, then something will change. But having an issue that big, that an attacker is able to do this, I really do not have to care about RCE via Logback - or do I? My system is captured anyways and it's over!
Okay, i cannot use some functionalities over Logback since they are disabled in 1.2.9 but I don't have to either since I have write access on the system.
Defining the abuse of functionalities requiring those conditions as vulnerability sounds a bit misleading to me.