blogs.apache.org
Open in
urlscan Pro
2a01:4f8:c0c:6060::1
Public Scan
Submitted URL: https://info.interos.ai/e3t/Btc/I5+113/cHX8904/VW0Ywl41-4Q-W9gmBww4tHfwRVDyhz94DJljgN78Lwtm2-MK5V1-WJV7CgFvXN27yKmpyb2sC...
Effective URL: https://blogs.apache.org/foundation/entry/apache-log4j-cves?_hsmi=201737321&_hsenc=p2ANqtz-8N7EtlHIYIvWiqW4cvCKFh7J6wNgTX...
Submission: On January 24 via api from CH — Scanned from DE
Effective URL: https://blogs.apache.org/foundation/entry/apache-log4j-cves?_hsmi=201737321&_hsenc=p2ANqtz-8N7EtlHIYIvWiqW4cvCKFh7J6wNgTX...
Submission: On January 24 via api from CH — Scanned from DE
Form analysis
1 forms found in the DOMGET /foundation/search
<form id="searchForm" method="get" action="/foundation/search" style="margin: 0; padding: 0" onsubmit="return validateSearch(this)">
<p>
<input type="text" id="q" name="q" size="10" class="text small" maxlength="255" value="">
<input type="submit" class="button" value="Search" id="searchbutton">
</p>
</form>
Text Content
* Foundation * Projects * People * Get Involved * Support Apache * Download THE APACHE SOFTWARE FOUNDATION BLOGGING IN ACTION. -------------------------------------------------------------------------------- THE APACHE SOFTWARE FOUNDATION BLOG « The Apache Weekly... | Main | The Apache Weekly... » Tuesday December 14, 2021 Apache Log4j CVEs The Apache Software Foundation project Apache Logging Services has responded to a security vulnerability that is described in two CVEs, CVE-2021-44228 and CVE-2021-45046. In this post we’ll list the CVEs affecting Log4j and keep a list of frequently asked questions. The most recent CVE has been addressed in Apache Log4j 2.16.0, released on 13 December. We recommend that users update to 2.16.0 if possible. While the 2.15.0 release addressed the most severe vulnerability, the fix in Log4j 2.15.0 was incomplete in some non-default configurations and could allow an attacker to execute a denial of service (DoS) attack. Users still on Java 7 should upgrade to the Log4j 2.12.2 release. CVE-2021-44228: APACHE LOG4J2 JNDI FEATURES DO NOT PROTECT AGAINST ATTACKER CONTROLLED LDAP AND OTHER JNDI RELATED ENDPOINTS In Apache Log4j2 versions up to and including 2.14.1, the JNDI features used in configurations, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. See the entire description and history on the Apache Logging security page. CVE-2021-45046: APACHE LOG4J2 THREAD CONTEXT MESSAGE PATTERN AND CONTEXT LOOKUP PATTERN VULNERABLE TO A DENIAL OF SERVICE ATTACK It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers, in some situations, to craft malicious input data using a JNDI Lookup pattern resulting in a DoS attack. Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property log4j2.formatMsgNoLookups to true do NOT mitigate this specific vulnerability. See the entire description and history on the Apache Logging security page. CVE-2021-4104: DESERIALIZATION OF UNTRUSTED DATA IN JMSAPPENDER IN APACHE LOG4J 1.2 Apache Log4j 1.x has been end-of-life since August 2015. However, we are aware that it is still a dependency for some applications and in use in some environments. We have found that Log4j 1.2, if used in a non-default configuration with JMSAppender used to perform JNDI requests, is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. This is not the same vulnerability described in the recent Log4j 2.x CVEs, but it could also result in remote code execution (RCE), so we are providing this information to make users aware of the vulnerability and urge them to upgrade to Log4j 2.16.0 or 2.12.2, or to take steps to mitigate the issue by disabling the use of JMSAppender to perform JNDI requests. FREQUENTLY ASKED QUESTIONS ABOUT THE LOG4J VULNERABILITIES In this section we’ll try to address some of the most common questions that our community and press have had about the Log4j vulnerabilities. WHAT ABOUT SYSTEMS OR APPLICATIONS WITH LOG4J 1.X? While the Log4j 1.x series is not known to be affected by the two CVEs above, it has reached end of life and is no longer supported. Vulnerabilities reported after August 2015 against Log4j 1.x were not checked and will not be fixed. Users should upgrade to Log4j 2 to obtain security fixes. HOW MANY SYSTEMS HAVE BEEN IMPACTED OR HOW WIDESPREAD IS THE IMPACT OF THIS CVE? Log4j, like all software distributed by the Apache Software Foundation, is open source. It’s been distributed via a mirror system for many years and then more recently via a Content Delivery Network (CDN) directly to users and developers, and also to organizations who have then shipped it as part of their projects, products or services. We know that Log4j is included in a number of ASF projects, other open source projects and a number of products and services. But beyond that any numbers would merely be speculation and most likely wrong by a wide margin. ARE ANY OTHER APACHE PROJECTS IMPACTED BY THE LOG4J VULNERABILITIES? Yes. The Apache Security Team has compiled a list of projects that are known to be affected with links to updates if available. See the Apache projects affected by log4j CVE-2021-44228 blog post. Apache Log4j is the only Logging Services subproject affected by this vulnerability. Other projects like Log4net and Log4cxx are not impacted by this. HOW CAN I GET HELP? If you need help on building or configuring Log4j or other help on following the instructions to mitigate the known vulnerabilities listed here, please send your questions to the public Log4j Users mailing list If you have encountered an unlisted security vulnerability or other unexpected behavior that has security impact, or if the descriptions here are incomplete, please report them privately to the Log4j Security Team. Thank you. Posted at 11:37PM Dec 14, 2021 by Joe Brockmeier in General | | Comments: Post a Comment: Comments are closed for this entry. CALENDAR « January 2022SunMonTueWedThuFriSat 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Today SEARCH HOT BLOGS (TODAY'S HITS) TAG CLOUD 2020 2021 apache apachecon asf at big bigdata cloud community data foundation hadoop initiatives just news open opensource processes project projects round-up software source success summary the tlp weekly works CATEGORIES * All * General * ApacheCon * Projects * Milestones * SuccessAtApache * Newsletter FEEDS * All * General * ApacheCon * Projects * Milestones * SuccessAtApache * Newsletter * Comments LINKS * Help Wanted: Find tasks to help ASF Projects * ASF Sponsors: Organizations that support The ASF * Get started with The ASF * The Apache Way * ASF Reports and Statements NAVIGATION * ASF Blogs * Weblog * Login