Hi Paul, hi Ken, thank you so much for the info!!!
I use only Wonder, and the only Log4J I see in the class path is log4j-1.2.17 from ERJar, so I think is ok. Thanks again!!! *Daniele Corti - **IT* VINATI Srl rs.dani...@vinati.com tel: +39 030 2532813 fax: +39 030 2532814 ___________________________ CONFIDENTIALITY NOTICE Questo messaggio (incluso qualsiasi allegato alla presente) contengono informazioni confidenziali e sono rivolte esclusivamente ai destinatari citati nel messaggio. Se non siete i destinatari non è concesso reinoltrare, distribuire, copiare o fare use di questo messaggio. Se avete ricevuto questo messaggio per errore siete pregati di avvisare immediatamente il mittente via e-mail, e di cancellare la presente dal vostro sistema. This message (including any attachments transmitted with it) contains confidential information and is intended only for the individual named herein. If you are not the herein named addressee you should not disseminate, distribute, copy or otherwise make use of this message. Please notify the sender immediately by e-mail if you have received this message by mistake, and delete it from your systems. On 14 dicembre 2021 a 02:37:31, Paul Hoadley via Webobjects-dev ( webobjects-dev@lists.apple.com) scritto: Hello, On 13 Dec 2021, at 20:56, Daniele Corti via Webobjects-dev < webobjects-dev@lists.apple.com> wrote: Today the vulnerability CVE-2021-44228 details (log4j) are out and looks like all log4j versions are affected! I’ve seen many attempt on the logs of the servers, but I was not able to understand if also my ERJar which contains the log4j-1.2.17 is affected. As Ken Anderson noted, it only affects versions >=2.0-beta9 and <=2.14.1. https://logging.apache.org/log4j/2.x/security.html So log4j-1.2.17 specifically is unaffected. If that's the only Log4J you've got on the classpath, you're not affected. If you're running a vanilla Wonder app, you're almost certainly not using Log4J 2. Anyone was able to check if the standard er.extensions.logging.ERXConsoleAppender is vulnerable? It's "vulnerable" only to the extent that it does use '%m' to print the log message (and a potential mitigation is to use '%m{nolookups}' if you're on version >= 2.7), but that's only relevant if you're using a vulnerable version of Log4J 2. Here are some brief notes I posted to Slack earlier today: * The good news is that if you're just using vanilla WebObjects/Wonder, you're probably not affected by it: Wonder is still on Log4J 1. You might have a dependency pulling in Log4J 2, though it's not clear to me whether that would matter unless you had the app-level co-operation to set up and use Log4J 2 to do actual logging. If you're using Maven, it's very easy to check: "mvn dependency:tree | grep log4j". * In any case, if you're definitely using Log4J 2 (we are—I went to some effort months ago to set it up!), you can mitigate the issue immediately by re-launching all instances with "-Dlog4j2.formatMsgNoLookups=true". That will give you time to re-build with Log4J 2.15.0. * Finally, if you're using AWS and you're using Web Application Firewall (WAF, which I highly recommend), you're already covered by the AWSManagedRulesKnownBadInputsRuleSet rules—if you're not using that set, add it immediately. -- Paul Hoadley https://logicsquad.net/ https://www.linkedin.com/company/logic-squad/ _______________________________________________ Do not post admin requests to the list. They will be ignored. Webobjects-dev mailing list (Webobjects-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/webobjects-dev/rs.daniele%40vinati.com This email sent to rs.dani...@vinati.com
_______________________________________________ Do not post admin requests to the list. They will be ignored. Webobjects-dev mailing list (Webobjects-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/webobjects-dev/archive%40mail-archive.com This email sent to arch...@mail-archive.com