[ 
https://issues.apache.org/jira/browse/LOG4J2-3262?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17466317#comment-17466317
 ] 

Sivakumar Sivaprahasam commented on LOG4J2-3262:
------------------------------------------------

Hello [~vy], thanks for the note. I checked [the security 
page|https://logging.apache.org/log4j/2.x/security.html] now and noticed that 
the mitigation for CVE-45046 under 2.x version still requires update.

As you mentioned I will perhaps create a PR for the same and have this ticket 
closed. 

Thanks

> Log4j 2.x mitigations for CVE-45046 is insufficient
> ---------------------------------------------------
>
>                 Key: LOG4J2-3262
>                 URL: https://issues.apache.org/jira/browse/LOG4J2-3262
>             Project: Log4j 2
>          Issue Type: Bug
>          Components: Documentation
>            Reporter: Sivakumar Sivaprahasam
>            Priority: Major
>              Labels: security
>
> The mitigation steps provided for CVE-2021-45046 for those who cannot upgrade 
> to 2.16, seems insufficient. The current description for CVE-2021-45046 says 
> it includes attacks using non-default Pattern Layout with a Context Lookup in 
> the configuration.
> The removal of JNDILookup class file isn't the only solution to curb this 
> issue because the lookup still occurs when the config is loaded. 
> Hence the mitigation steps must include the removal of references to context 
> lookups where the data comes from ThreadContext or from external sources at 
> runtime. (similar to the one provided for CVE-2021-45105 or the same can be 
> included here too)



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to