Removing JndiLookup helps by preventing the JNDI attack. You absolutely need to 
do this if you do not upgrade.

For item 2 look at your log4j2 configuration file. If it contains 
${ctx:somekey} then you need to understand how somekey is being populated. I 
would venture to guess that most Log4j2 configurations won’t have ${ctx: in 
them in which case there is nothing to do.

Ralph

> On Dec 19, 2021, at 9:54 PM, b...@virtualcdc.com wrote:
> 
> 
> Dear team
> Hi.
> 
> According to Log4j vulnerability as I know one of the solution was remove 
> JndiLookup.class file from log4j-core-*.jar file .
> 
> But now we see other vulnerability :
> 
> upgrade to 2.17 or
> Otherwise, in the configuration, remove references to Context Lookups like 
> ${ctx:loginId} or $${ctx:loginId} where they originate from sources external 
> to the application such as HTTP headers or user input.
> 
> 1- Is that your mean remove class file (JndiLookup.class) cannot help us ?
> 2- Would you please say how we can do this on Linux systems ?
> in the configuration, remove references to Context Lookups like 
> ${ctx:loginId} or $${ctx:loginId} where they originate from sources external 
> to the application such as HTTP headers or user input.
> 
> Best regards.
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: log4j-user-unsubscr...@logging.apache.org
> For additional commands, e-mail: log4j-user-h...@logging.apache.org
> 
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: log4j-user-unsubscr...@logging.apache.org
For additional commands, e-mail: log4j-user-h...@logging.apache.org

Reply via email to