Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033121", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2033121", "tags": ["Issue Tracking", "Patch", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://access.redhat.com/security/cve/CVE-2021-44228", "name": "https://access.redhat.com/security/cve/CVE-2021-44228", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/kube-reporting/hive/pull/71", "name": "https://github.com/kube-reporting/hive/pull/71", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://access.redhat.com/security/cve/CVE-2021-4125", "name": "https://access.redhat.com/security/cve/CVE-2021-4125", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/kube-reporting/hive/pull/73", "name": "https://github.com/kube-reporting/hive/pull/73", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/kube-reporting/hive/pull/72", "name": "https://github.com/kube-reporting/hive/pull/72", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "https://access.redhat.com/security/cve/CVE-2021-45046", "name": "https://access.redhat.com/security/cve/CVE-2021-45046", "tags": ["Third Party Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "It was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed. This CVE only applies to the OpenShift Metering hive container images, shipped in OpenShift 4.8, 4.7 and 4.6."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-502"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2021-4125", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}}, "publishedDate": "2022-08-24T16:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:redhat:openshift:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.8.24", "versionStartIncluding": "4.8.0"}, {"cpe23Uri": "cpe:2.3:a:redhat:openshift:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.7.40", "versionStartIncluding": "4.7.0"}, {"cpe23Uri": "cpe:2.3:a:redhat:openshift:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.6.52", "versionStartIncluding": "4.6.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apache:hive:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "4.6.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2022-08-29T14:26Z"}