[
https://issues.apache.org/jira/browse/LOG4J2-3230?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17461519#comment-17461519
]
Bernd Eckenfels commented on LOG4J2-3230:
-----------------------------------------
Do you plan a CVE for it? Unfortunatelly a number of sources already labeled
the second CVE a „deny of service“ so I fear this might get a bit confused if
it hasn’t have its own CVE. If somebody has mitigated log4shell with removing
JNDI lookup, they might still be vulnerable to this one, if they. Don’t set the
nolookup. (And even 2.16 to a local Admin DOS, But that’s not really a vector i
would care about, don’t think there are any multi-tenant scenarios where this
is relevant)
> Certain strings can cause infinite recursion
> --------------------------------------------
>
> Key: LOG4J2-3230
> URL: https://issues.apache.org/jira/browse/LOG4J2-3230
> Project: Log4j 2
> Issue Type: Bug
> Components: Core
> Affects Versions: 2.8, 2.8.1, 2.8.2, 2.9.0, 2.9.1, 2.10.0, 2.11.0, 2.11.1,
> 2.11.2, 2.12.0, 2.12.1, 2.13.0, 2.13.1, 2.13.2, 2.14.0, 2.13.3, 2.14.1,
> 2.15.0, 2.16.0
> Reporter: Ross Cohen
> Assignee: Carter Kozak
> Priority: Major
> Fix For: 2.17.0
>
> Attachments: sample.tar.gz
>
>
> If a string substitution is attempted for any reason on the following string,
> it will trigger an infinite recursion, and the application will crash:
> ${${::\-${::\-$${::\-j}}}}.
--
This message was sent by Atlassian Jira
(v8.20.1#820001)