[ 
https://issues.apache.org/jira/browse/LOG4J2-3320?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17469676#comment-17469676
 ] 

Ralph Goers commented on LOG4J2-3320:
-------------------------------------

All of our recommendations are listed at 
[https://logging.apache.org/log4j/2.x/security.html.] SMTPAppender is not 
impacted by any of these CVEs. Removing JndiManager, JmsAppender, JdbcAppender, 
& JndiContextSelector may, or may not, work depending on the release of Log4j. 
Generally, if the application starts without getting a NoClassDefFoundError you 
should be OK. However, JndiLookup was the critical component to remove as there 
were various attack vectors to get to it. The other classes pretty much all 
have to be configured in the Log4j configuration for there to be an issue.

> log4j vulnerability / Mitigations
> ---------------------------------
>
>                 Key: LOG4J2-3320
>                 URL: https://issues.apache.org/jira/browse/LOG4J2-3320
>             Project: Log4j 2
>          Issue Type: Bug
>            Reporter: encryptomator
>            Priority: Major
>
> Hi,
> I have read that besides the JndiLookup classes, there are others that need 
> to be removed.
> JndiManager, JMSAppender, SMTPAppender.
> Does anyone here know more about this?
> https://fossa.com/blog/quickly-find-remediate-log4j-vulnerabilities-log4shell/



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to