[ 
https://issues.apache.org/jira/browse/LOG4J2-3279?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17470230#comment-17470230
 ] 

Ralph Goers commented on LOG4J2-3279:
-------------------------------------

The infinite recursion happens when a user passes an infinitely recursive 
lookup string in an HTTP header (for example) and you store that in a 
ThreadContext variable which you then reference in something evaluated as part 
of event processing - such as the Route on a routing appender. If you know you 
aren't putting unverified data into ThreadContext variables that are then 
referenced in the configuration when processing logging events then you are not 
subject to the problem - with one caveat.

The original security report - CVE-2021-44228 allowed lookups to be processed 
when they appeared in the data being logged. To avoid that you either need to 
set the system property or use the \{nolookups} option on the %m converter in 
the PatternLayout. However, you will noticed that in the history section of two 
of the CVEs it is called out that these mitigations are insufficient. They do 
work for the vast majority of logging but if you have code that uses 
logger.printf(), or uses one of the alternate MessageFactories then those 
events are not blocked from processing lookups. If you are 100% sure your code 
doesn't have anything but vanilla format strings (for example if you use SLF4J 
you cannot have anything else) then this mitigation would work. If you are 
unsure you MUST upgrade.

To be clear, the only solution the Log4j team can really recommend is to 
upgrade to 2.3.2, 2.12.4 or 2.17.1 to be absolutely sure as well as to be in 
compliance with things like 
https://techcrunch.com/2022/01/05/ftc-legal-action-log4j/.

> Alternative mitigation documented for CVE-2021-45105 doesn't work for 
> messages without context lookup if the Log4J2 consumers are not on version >= 
> 2.15
> --------------------------------------------------------------------------------------------------------------------------------------------------------
>
>                 Key: LOG4J2-3279
>                 URL: https://issues.apache.org/jira/browse/LOG4J2-3279
>             Project: Log4j 2
>          Issue Type: Bug
>          Components: Documentation
>    Affects Versions: 2.14.0
>            Reporter: sumeet sharma
>            Priority: Major
>
> Alternative mitigation documented for CVE-2021-45105 doesn't work for 
> messages without context lookup if the Log4J2 consumers are not on version >= 
> 2.15.
> Official mitigation provided in 
> [https://logging.apache.org/log4j/2.x/security.html] reads:
> h3. 
> "[CVE-2021-45105|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105]:
> Apache Log4j2 does not always protect from infinite recursion in lookup 
> evaluation
> h3. <trimmed for brevity>
> h3. Mitigation
> h4. Log4j 1.x mitigation
> Log4j 1.x is not impacted by this vulnerability.
> h4. Log4j 2.x mitigation
> Upgrade to Log4j 2.3.1 (for Java 6), 2.12.3 (for Java 7), or 2.17.0 (for Java 
> 8 and later).
> *Alternatively, this infinite recursion issue can be mitigated in 
> configuration:*
>  * *In PatternLayout in the logging configuration, replace Context Lookups 
> like ${ctx:loginId} or $${ctx:loginId} with Thread Context Map patterns (%X, 
> %mdc, or %MDC).*
>  * *Otherwise, in the configuration, remove references to Context Lookups 
> like ${ctx:loginId} or $${ctx:loginId} where they originate from sources 
> external to the application such as HTTP headers or user input."*
> The alternative mitigation statement seems to be making assumptions. 
> The infinite recursion issue in the message part of the log seems to be fixed 
> in version 2.15. Versions prior to that (I tried on 2.14.0), this issue is 
> still applicable. **
> Assuming a user is on Log4J 2.14.0, if they follow this mitigation step by 
> step, they will still be able to reproduce infinite recursion issue.
> pom.xml
> {code:java}
>  <dependencies>
>         <dependency>
>             <groupId>org.apache.logging.log4j</groupId>
>             <artifactId>log4j-api</artifactId>
>             <version>2.14.0</version>
>         </dependency>
>         <dependency>
>             <groupId>org.apache.logging.log4j</groupId>
>             <artifactId>log4j-core</artifactId>
>             <version>2.14.0</version>
>         </dependency>
>     </dependencies> {code}
> Code:
> {code:java}
> LOG.info("Problematic payload {}", "${${::${::$${::-j}}}}");
> LOG.info("Problematic payload ${${::${::$${::-j}}}}");{code}
>  
> Log4j2.xml
> {code:java}
> <Console name="Console" target="SYSTEM_OUT">
>             <PatternLayout pattern="%d{HH:mm:ss.SSS} [%t] %-5level 
> %logger{36} - %m%n"/>
>         </Console>{code}
>  
> Output
> {code:java}
> 2021-12-23 14:40:49,031 main ERROR An exception occurred processing Appender 
> Application java.lang.IllegalStateException: Infinite loop in property 
> interpolation of ::-${::-$${::-j}}: : {code}
>  
> If this stands true, then the documentation should mention:
>  * either the minimum required version
>  * or usage of -Dlog4j2.formatMsgNoLookups=true for the alternative 
> mitigation to work.
>  
> I've only kept 2.14.0 as the affected version as I tested on same but this 
> might be applicable to quite a few versions.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to