Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2021-44228 @ Maven-org.apache.logging.log4j:log4j-core-2.3 #45

Open
margaritalm opened this issue Dec 25, 2022 · 0 comments
Open

CVE-2021-44228 @ Maven-org.apache.logging.log4j:log4j-core-2.3 #45

margaritalm opened this issue Dec 25, 2022 · 0 comments

Comments

@margaritalm
Copy link
Owner

margaritalm commented Dec 25, 2022

Checkmarx (SCA): Vulnerable Package
Vulnerability: Read More about CVE-2021-44228
Checkmarx Project: margaritalm/BookStore_Small_CLI_small
Repository URL: https:/margaritalm/BookStore_Small_CLI_small
Branch: master
Scan ID: 79dde67e-447e-480d-9f9e-f0bfb2e3e6f8


Apache Log4j2 2.0-beta9 through 2.12.1 (excluding 2.3.1) and 2.13.0 through 2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (for users requiring Java 8 or later), 2.12.2 (for Java 7 users), and 2.3.1 (for Java 6 users) this functionality has been completely removed.
Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

How to remediate the Log4j RCE vulnerability?

The easiest and most recommended way to remediate this vulnerability is to update to log4j version 2.17.0 or later.

If updating the package is an issue, you may remove the JndiLookup class from the classpath. The command to perform such action is:
zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class.


Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: HIGH
Availability impact: HIGH
Remediation Upgrade Recommendation: 2.3.2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant