Good to note that this only covers the common use case. That property didn’t 
end up protecting some advanced use cases that were patched in later releases 
of log4j-core (CVE-2021-45046 to be specific). It’s a fairly important flag to 
set in older versions, though, as it’s a fairly broken “feature” as it is 
regardless of the RCE aspect. Just note that it’s not sufficient to protect 
against configurations that use lookups to insert user-provided data.
--
Matt Sicker

> On Dec 27, 2021, at 07:26, Ceki Gülcü <c...@qos.ch> wrote:
> 
> Hi David,
> 
> Thank you for your sharing this information.
> -- 
> Ceki Gülcü
> 
> Please contact suppport(at)qos.ch for donations, sponsorship or support 
> contracts related to SLF4J or logback projects.
> 
> On 22/12/2021 22:24, David Smiley wrote:
>> Hello Slf4j community,
>> I'd like to share a happy discovery about the well-known "Log4shell" 
>> vulnerability on Log4j2.  Apps that use Slf4j with Log4j2 backing (and which 
>> don't otherwise call Log4j2 directly) can be mitigated by 
>> log4j2.formatMsgNoLookups=true
>> https://lists.apache.org/thread/kgh63sncrsm2bls884pg87mnt8vqztmz 
>> <https://lists.apache.org/thread/kgh63sncrsm2bls884pg87mnt8vqztmz>
>> As I write this (with Ralph having yet to respond to my follow-up), it's not 
>> really some final determination but it's highly encouraging.
>> ~ David Smiley
>> Apache Lucene/Solr Search Developer
>> http://www.linkedin.com/in/davidwsmiley 
>> <http://www.linkedin.com/in/davidwsmiley>
> _______________________________________________
> slf4j-user mailing list
> slf4j-user@qos.ch
> http://mailman.qos.ch/mailman/listinfo/slf4j-user

_______________________________________________
slf4j-user mailing list
slf4j-user@qos.ch
http://mailman.qos.ch/mailman/listinfo/slf4j-user

Reply via email to