Skip to content
This repository has been archived by the owner on Jul 10, 2024. It is now read-only.

log4j 1.2.14 is vulnerable deserialization of untrusted data (CVE-2019-17571) #56

Open
TheBierbrauer opened this issue Jan 13, 2022 · 2 comments

Comments

@TheBierbrauer
Copy link

Log4j needs to be updated (or replaced) to fix this vulnerability

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17571

@keeganwitt
Copy link
Contributor

keeganwitt commented Jan 20, 2022

Log4j 1 was end of life August 5, 2015, so this fix should be

  • Upgrade to Log4J 2 (could use the bridge for this, but I don't think it'd be a lot of work to just upgrade completely)..
  • Switch to reload4j.
  • Switch to Logback or some other logging framework.

@Damon-V79
Copy link

Hello, I think this issue can be closed. Log4j in master was updated:

   ...
* |   0d2e54bf    Merge branch 'jira/PROC-1059' into 'master'    Kenta Isozuka
|\ \  
| |/  
|/|   
| * 0765ee72    PROC-1059: Remove slf4j    kisozuka
| * 5c33c660    PROC-1059: Fix Logger to use log4j2    kisozuka
| * 5aa4b3dc    PROC-1059: Upgrade log4j to 2.17.1    kisozuka
|/  
*   044c20d7    Merge branch 'jira/PROC-1015' into 'master'    Taito Ri
   ...

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants