Aman Mishra created AMQ-8430:
--------------------------------

             Summary: Log4j 1.2.17 is being used in activemq-all : 
[CVE-2021-44228] [log4j] [1.2.17] 
                 Key: AMQ-8430
                 URL: https://issues.apache.org/jira/browse/AMQ-8430
             Project: ActiveMQ
          Issue Type: Bug
          Components: AMQP
    Affects Versions: 5.16.3
            Reporter: Aman Mishra


*Aqua Description :* Apache Log4j2 <=2.14.1 JNDI features used in 
configuration, log messages, and parameters do not protect against attacker 
controlled LDAP and other JNDI related endpoints. An attacker who can control 
log messages or log message parameters can execute arbitrary code loaded from 
LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, 
this behavior has been disabled by default. In previous releases (>2.10) this 
behavior can be mitigated by setting system property 
"log4j2.formatMsgNoLookups" to “true” or by removing the JndiLookup class from 
the classpath (example: zip {-}q -d log4j-core{-}*.jar 
org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see 
[https://www.oracle.com/java/technologies/javase/8u121-relnotes.html]) protects 
against remote code execution by defaulting 
"com.sun.jndi.rmi.object.trustURLCodebase" and 
"com.sun.jndi.cosnaming.object.trustURLCodebase" to "false".



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to