-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update pom.xml #9225
base: HNC-571
Are you sure you want to change the base?
Update pom.xml #9225
Conversation
f08a0ed
to
d4fd575
Compare
86622a6
to
4e414ca
Compare
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2021-44228 ] org.apache.logging.log4j:log4j-core 2.13.0Description: Due to the When an attacker sends a JNDI lookup string such as - Due to ease of exploitation, the vulnerability has been reported to be exploited in the wild, and many exploit PoCs are available on Github. Note that Java runtimes of version 6u211, 7u201, 8u191, 11.0.1 or any later version are not susceptible to the LDAP-based exploit, since JNDI cannot load a remote codebase using LDAP (due to the The affected Maven package is log4j-core. Remediation: Deployment mitigationsUpgrade your Java runtime to one of the following versions (or any later version): This method is less recommended than the other deployment mitigations, since it only protects against the LDAP exploit (which is the widely published exploit), but potentially leaves other context-dependent JNDI injections open. Deployment mitigationsMethod 1 - Disabling Lookups in log messages: Alternatively, this can be configured globally by setting the environment variable
Method 2: Removing the vulnerable class:
This will recursively find all JAR files in the current directory and remove the vulnerable Note: This method is recommended only as last resort. It is possible that the vulnerable [ CVE-2021-45046 ] org.apache.logging.log4j:log4j-core 2.13.0Description: The main impact of CVE-2021-45046 is allowing for Log4j2 message lookups to be used, even in cases where they have been disabled.
CVE-2021-45046 revealed that the above mitigations only affect the message part of the pattern layout. However - in some non-default Log4j2 configurations, the attacker may have control over non-message parts of the pattern layout. Exploitation of CVE-2021-45046 (which means - bypass of the above mitigation) results in remote code execution for all relevant Log4j2 versions. Examples of known vulnerable Log4j2 configurations -
ThreadContext.put("tainted", TAINTED);
logger.error("FOO");
MapMessage msg = new StringMapMessage().with("message", "H").with("tainted", TAINTED);
logger.error(msg);
logger.info(new ObjectMessage(TAINTED));
StructuredDataMessage m = new StructuredDataMessage("1", "H", "event");
m.put("tainted", TAINTED);
logger.error(m); Please see JFrog's blogpost appendix C for more details Remediation: Deployment mitigationsIn the vulnerable application, override the OR Upgrade your Java runtime to one of the following versions (or any later version): [ CVE-2021-45105 ] org.apache.logging.log4j:log4j-core 2.13.0Description: [ CVE-2021-44832 ] org.apache.logging.log4j:log4j-core 2.13.0Description: Remediation: Development mitigationsRemove the [ CVE-2021-45105 ] org.apache.logging.log4j:log4j-core 2.13.0Description: [ CVE-2020-9488 ] org.apache.logging.log4j:log4j-core 2.13.0Description: Note:Frogbot also supports Contextual Analysis, Secret Detection, IaC and SAST Vulnerabilities Scanning. This features are included as part of the JFrog Advanced Security package, which isn't enabled on your system. |
No description provided.