[ 
https://issues.apache.org/jira/browse/LOG4J2-3230?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17461613#comment-17461613
 ] 

Jon Bristow commented on LOG4J2-3230:
-------------------------------------

[~mfriedenhagen] While my initial impressions lead me to agree with you, I'm 
still unwilling to declare anything definitively regarding safety/non-safety. 
(Such is the nature of things, eh?)

Please, if anyone can actually provide an explanation (or even better a minimal 
example) that would make this a security risk? especially a DOS?  I can see 
this being potentially a log evasion kind of attack, but I am famously 
un-creative when it comes to abuse cases, so I would love if someone could 
explain why I'm wrong.

Things I may have missed:
 * other kinds of appenders
 * interactions with different Java versions. (I was able to get the same 
results in "openjdk 11.0.12 2021-07-20", "OpenJDK Runtime Environment 
Corretto-8.282.08.1", and "openjdk 17 2021-09-14")
 * interactions with many long-running processes
 * heap pollution

> Certain strings can cause infinite recursion
> --------------------------------------------
>
>                 Key: LOG4J2-3230
>                 URL: https://issues.apache.org/jira/browse/LOG4J2-3230
>             Project: Log4j 2
>          Issue Type: Bug
>          Components: Core
>    Affects Versions: 2.8, 2.8.1, 2.8.2, 2.9.0, 2.9.1, 2.10.0, 2.11.0, 2.11.1, 
> 2.11.2, 2.12.0, 2.12.1, 2.13.0, 2.13.1, 2.13.2, 2.14.0, 2.13.3, 2.14.1, 
> 2.15.0, 2.16.0
>            Reporter: Ross Cohen
>            Assignee: Carter Kozak
>            Priority: Major
>             Fix For: 2.17.0
>
>         Attachments: sample.tar.gz
>
>
> If a string substitution is attempted for any reason on the following string, 
> it will trigger an infinite recursion, and the application will crash: 
> ${${::\-${::\-$${::\-j}}}}.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to