SpComb edited a comment on pull request #608:
URL: https://github.com/apache/logging-log4j2/pull/608#issuecomment-993560912


   > I'm not quite sure what that means or where we should continue the 
discussion about that, if it s a new attack vector etc.
   
   This should really have been reported privately, or at the minimum via a 
separate GitHub issue, rather than via a public GitHub PR comment.
   
   For anyone else that may come across similar follow-up issues, I suggest you 
follow the instructions on the log4j project website, and use the 
[email protected] email address: 
https://logging.apache.org/log4j/2.x/security.html
   
   > If you have encountered an unlisted security vulnerability or other 
unexpected behaviour that has security impact, or if the descriptions here are 
incomplete, please report them privately to the [Log4j Security 
Team]([email protected]). Thank you.
   
   If this does turn out to be a new attack vector, it probably needs a new CVE 
number. I've attempted to contact the relevant security contacts to take this 
further, I don't know what else to do.
   
   EDIT: https://issues.apache.org/jira/browse/LOG4J2-3221 new Jira ticket for 
tracking this issue, which strictly speaking isn't relevant to the JNDI 
restrictions in this PR. The `log4j2.allowedJndiProtocols/Hosts/Classes` 
defaults implemented in https://github.com/apache/logging-log4j2/pull/608 / 
2.15.0 are good, and the `log4j2.enableJndi=false` in 
https://github.com/apache/logging-log4j2/commit/44569090f1cf1e92c711fb96dfd18cd7dccc72ea
 / 2.15.1-rc1 / 2.16.0 are even better.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to