[ 
https://issues.apache.org/jira/browse/SHIRO-847?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17500410#comment-17500410
 ] 

Brian Demers commented on SHIRO-847:
------------------------------------

[~pj.fanning] it is, the scope is set in the parent pom: 
https://repo1.maven.org/maven2/org/apache/shiro/shiro-root/1.8.0/shiro-root-1.8.0.pom

Running a dependency tree on your project should confirm this: `mvn 
dependency:tree` (or similar gradle command)

That said, we _should_ probably move the `scope` from dependency management to 
where the dep is consumed to avoid any confusion (and some general POM cleanup)

> Log4j 1.x 版本的CVE-2022-23302/23305/23307在Apache Shiro 1.8.0版本是否受影响
> -----------------------------------------------------------------
>
>                 Key: SHIRO-847
>                 URL: https://issues.apache.org/jira/browse/SHIRO-847
>             Project: Shiro
>          Issue Type: Question
>    Affects Versions: 1.8.0
>            Reporter: boyqian
>            Priority: Blocker
>
> h2. 漏洞描述
> h3. Apache log4j JMSSink反序列化代码执行漏洞(CVE-2022-23302):
> 当攻击者具有修改Log4j配置的权限或配置引用了攻击者有权访问的LDAP服务时,Log4j1.x所有版本中的JMSSink 
> 都容易受到不可信数据的反序列化。攻击者可以提供一个TopicConnectionFactoryBindingName 
> 配置,利用JMSSink执行JNDI请求,从而以与CVE-2021-4104类似的方式远程执行代码。Log4j默认配置时不受此漏洞影响。
> h3. Apache log4j JDBCAppender SQL注入漏洞(CVE-2022-23305):
> 由于Log4j 
> 1.2.x中的JDBCAppender接受SQL语句作为配置参数,PatternLayout的消息转换器未对其中输入的值进行过滤。攻击者可通过构造特殊的字符串到记录应用程序输入的内容中来操纵SQL,从而实现非法的SQL查询。Log4j默认配置时不受此漏洞影响。
> h3. Apache log4j Chainsaw反序列化代码执行漏洞(CVE-2022-23307):
> Log4j 
> 1.2.x中的日志查看器Chainsaw中存在反序列化问题,可能造成任意代码执行,该漏洞此前被命名为CVE-2020-9493,官方已发布Apache 
> Chainsaw 2.1.0版本进行修复。Log4j默认情况下未配置Chainsaw使用。
> Chainsaw 
> v2是由Log4j开发社区成员编写的与Log4j配套的应用程序,是一个基于GUI的日志查看器,可以读取Log4j的XMLLayout格式的日志文件。



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to