[ 
https://issues.apache.org/jira/browse/SOLR-18097?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18059064#comment-18059064
 ] 

Piotr Karwasz commented on SOLR-18097:
--------------------------------------

The default Solr logging configuration is *not* affected by CVE-2025-68161. And 
even if it were the vulnerability would be far from a priority. Basically, the 
CVE says that if an attacker has *man-in-the-middle* capability, your logging 
pipeline might be affected. However, in the case of a MITM capability, there 
are many other more critical services that can be affected.

 

I'll take a look at the VEX-generating workflows this week.

> Log4j Upgrade: 2.17.2 → 2.25.3 (CVE-2025-68161 Remediation) Confirmation on 
> remediation
> ---------------------------------------------------------------------------------------
>
>                 Key: SOLR-18097
>                 URL: https://issues.apache.org/jira/browse/SOLR-18097
>             Project: Solr
>          Issue Type: Bug
>      Security Level: Public(Default Security Level. Issues are Public) 
>          Components: SolrCloud
>    Affects Versions: 8.4
>            Reporter: Aviral Sinha
>            Priority: Blocker
>
> _*Given that we do not utilize socket appenders or any network-based logging 
> mechanisms, we believe that vulnerabilities specifically targeting the 
> transmission of logs over the network (such as those requiring a Socket 
> Appender to be active) are not applicable to our current architecure.*_
>  
> Could you please confirm if our assessment is correct? Specifically, we want 
> to ensure that in the absence of a declared Socket Appender, the risk of 
> exploitation is mitigated.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to