confluence.atlassian.com
Open in
urlscan Pro
2600:9000:2156:9000:15:77aa:5e80:93a1
Public Scan
URL:
https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html
Submission: On December 13 via api from AU — Scanned from DE
Submission: On December 13 via api from AU — Scanned from DE
Form analysis
2 forms found in the DOM<form><span class="fieldset">
<p><input type="checkbox" value="check" id="chkMain" checked="" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
</span></form>
<form>
<radiogroup>
<div class="reason-radio-box">
<label><input type="radio" name="was-this-helpful-no-reason" value="It wasn't accurate"> It wasn't accurate</label>
</div>
<div class="reason-radio-box">
<label><input type="radio" name="was-this-helpful-no-reason" value="It wasn't clear"> It wasn't clear</label>
</div>
<div class="reason-radio-box">
<label><input type="radio" name="was-this-helpful-no-reason" value="It wasn't relevant"> It wasn't relevant</label>
</div>
</radiogroup>
</form>
Text Content
Cookie Notice This site uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. To change your preferences, click Cookie Settings. Otherwise, clicking on the the website, closing the banner, or clicking Accept all Cookies indicates you agree to our use of cookies on your device. Atlassian Cookies and Tracking Notice Close Accept all Cookies Cookie Settings * Your Privacy * Strictly Necessary Cookies * Performance and Analytics Cookies * Functional Cookies * Targeting Cookies * Atlassian Cookies and Tracking Notice Privacy Preference Centre Active Always Active Save Settings Allow All * Products * Resources * Search * Log in * * View account * View requests * Log out * ... PRODUCTS * JIRA SOFTWARE Project and issue tracking * JIRA SERVICE MANAGEMENT Service management and customer support * JIRA CORE Manage any business project * CONFLUENCE Document collaboration * BITBUCKET Git code management See all RESOURCES * DOCUMENTATION Usage and admin help * COMMUNITY Answers, support, and inspiration * SYSTEM STATUS Cloud services health * SUGGESTIONS AND BUGS Feature suggestions and bug reports * MARKETPLACE Product apps * BILLING AND LICENSING Frequently asked questions * Log out * Log in to account * List watched pages * Contact support * Evaluator resources * Training & Certification * Cloud Migration Center * GDPR guides * Enterprise services * Atlassian partners * Developers * User groups * Automation for Jira * Atlassian.com * PAGE * View in Confluence * Edit Page * VIEWPORT * Manage Viewport * CONFLUENCE * Dashboard * Space Directory * People Directory Atlassian Knowledge Base Documentation Unable to load * Atlassian Support * Documentation * Atlassian Knowledge Base * FAQ for CVE-2021-44228 FAQ FOR CVE-2021-44228 ATLASSIAN KNOWLEDGE BASE * Application Links Troubleshooting Guide * Database Troubleshooting and How-to Guides * Best practices for performance troubleshooting tools * SSL/TLS Troubleshooting * Cross Product Knowledge * Proxying Atlassian Server applications * Atlassian Account Troubleshooting * Mapping Web Resources to Code * Subscribe to Proactive Announcements * How to capture HTTP traffic using Wireshark, Fiddler, or tcpdump * Cross Site Request Forgery (CSRF) protection changes in Atlassian REST * Purchased Add-ons feature is unavailable * Single Sign-on Integration with Atlassian products * Troubleshooting Services * Test disk access speed for a Java application * User Management Troubleshooting and How-To Guides * Atlassian login issues * JQL with OR results in error. * How to set the timezone for the Java environment * Websudo is disabled after migration from JIRA cloud to JIRA server * Health Check: Lucene index files location * Health Check: Thread Limit * Editor Window is Small After Upgrading where as the preview is Normal window size * Basic authentication fails for outgoing proxy in Java 8u111 * All Atlassian knowledge base articles * Creating A Jira Administrator That Does Not Count Towards License * Users are unable to log in to JIRA (LDAP: error code 49, data 52e) * User unable to login into Crowd after Crowd was upgraded * How to use the Performance Data Collector * Ports used by Atlassian Applications * How to define Xmx based on GC logs * How to log in to my Atlassian cloud site for the first time * How to block access to a specific URL at Tomcat * User-installed apps health check fails in Data Center when configuring CDN * HTTP2 health check fails in Data Center when configuring CDN * How to configure Apache for caching and HTTP/2 * How to Unsubscribe from Jira Server or Confluence Server apps on TestFlight * Unable to synchronize with Active Directory due to SSL requirement * Jira Align - Jira Connector pages do not load completely * Jira Align - Work In Process by Value Stream is missing work items * JVM is not reachable with jstat and jstack * Data pipeline troubleshooting * Using JDK 11 to develop apps with the Atlassian SDK is not yet supported * How to download Atlassian Marketplace apps through the command line * How to view Premier Support named contacts * Bidirectional characters warning in Atlassian products * FAQ for CVE-2021-42574 * Jira is logging multiple cache flushes in the application logs * FAQ for CVE-2021-44228 ON THIS PAGE STILL NEED HELP? The Atlassian Community is here for you. Ask the community GENERAL INFORMATION This page contains frequently asked questions and answers related to the recently published remote code execution (RCE) vulnerability affecting Log4j: https://www.lunasec.io/docs/blog/log4j-zero-day/ Are Cloud instances affected? Our Security team is currently investigating the impact of the Log4j remote code execution vulnerability (CVE-2021-44228) and determining any possible impacts. Is my on-premises Server/Data Center instance affected? Our Security team is currently investigating the impact of the Log4j remote code execution vulnerability (CVE-2021-44228) and determining any possible impact on our on-premise products. So far, we do not believe our on-premises products are vulnerable to exploitation in their default configuration. However, if a you have modified the default logging configuration (log4j.properties) to enable the JMS Appender functionality, remote code execution may be possible in the following products (Bitbucket Server & Data Center are not affected): * Jira Server & Data Center * Confluence Server & Data Center * Bamboo Server & Data Center * Crowd Server & Data Center * Fisheye * Crucible You can check if you are vulnerable by inspecting the Log4j configuration file. If you find a line containing the org.apache.log4j.net.JMSAppender, you may be vulnerable. If you do not find a line containing the org.apache.log4j.net.JMSAppender, you do not have this specific vulnerable configuration. How can I mitigate this exploit? If you're using the functionality provided by JMS Appender we recommend you mitigate the vulnerability as soon as possible by temporarily disabling any configured appenders utilizing org.apache.log4j.JMSAppender by commenting out the relevant lines in your Log4j configuration file and restarting the application. In a Data Center environment, a rolling restart of the nodes is sufficient after updating affected configuration files. The default location of the Log4j configuration file for each product is listed in the table below: Product Default Path Jira Server & Data Center <install-directory>/atlassian-jira/WEB-INF/classes/log4.properties Confluence Server & Data Center <install-directory>/confluence/WEB-INF/classes/log4j.properties Bamboo Server & Data Center <install-directory>/atlassian-bamboo/WEB-INF/classes/log4j.properties Fisheye / Crucible <install-directory>/log4j.xml Crowd <install-directory>/crowd-webapp/WEB-INF/classes/log4j.properties <install-directory>/crowd-openidclient-webapp/WEB-INF/classes/log4j.properties <install-directory>/crowd-openidserver-webapp/WEB-INF/classes/log4j.properties How can I tell if my system has been compromised? Unfortunately, Atlassian cannot confirm if your instance has been compromised. All security compromises are different, and we strongly recommend involving your local security team or a specialist security forensics firm for further investigation. Last modified on Dec 11, 2021 Was this helpful? Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this article Powered by Confluence and Scroll Viewport. Atlassian * Privacy policy * Terms of use * Security * © 2021 Atlassian