[ 
https://issues.apache.org/jira/browse/BEAM-13434?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17457162#comment-17457162
 ] 

Alexey Romanenko commented on BEAM-13434:
-----------------------------------------

I reduced a priority to P1 since it affects only the tests of some IOs.

> Bump up Apache log4j2 to 2.15.0 due to the vulnerability
> --------------------------------------------------------
>
>                 Key: BEAM-13434
>                 URL: https://issues.apache.org/jira/browse/BEAM-13434
>             Project: Beam
>          Issue Type: Improvement
>          Components: sdk-java-core
>    Affects Versions: 2.34.0
>            Reporter: Yu Ishikawa
>            Priority: P1
>          Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> ## Overview
> 2.0 <= Apache log4j2 <= 2.14.1 has vulnerability.
>  
> >  In most cases, developers may write error messages caused by user input 
> > into the log. Attackers can use this feature to construct special data 
> > request packets through this vulnerability, and ultimately trigger remote 
> > code execution.
>  
> ## References
>  * 
> [https://www.cyberkendra.com/2021/12/worst-log4j-rce-zeroday-dropped-on.html]
>  * 
> https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to