Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-19 Thread Luke Chen
in the log4j.properties file. Does it > mean we are safe ? > > Thanks, > Dhirendra. > > -Original Message- > From: Brian Rickabaugh > Sent: Wednesday, December 15, 2021 8:04 AM > To: users@kafka.apache.org > Subject: Re: CVE-2021-44228 – Log4j 2 Vulnerability >

RE: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-19 Thread Mailbox - Dhirendra Kumar Singh
the log4j.properties file. Does it mean we are safe ? Thanks, Dhirendra. -Original Message- From: Brian Rickabaugh Sent: Wednesday, December 15, 2021 8:04 AM To: users@kafka.apache.org Subject: Re: CVE-2021-44228 – Log4j 2 Vulnerability I'll second that. Thank you! Brian Quoting

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Brian Rickabaugh
I'll second that.  Thank you! Brian Quoting Luke Chen : Hi Jun, It looks great and clear! Thank you for working on the public statement! Thank you. Luke On Wed, Dec 15, 2021 at 8:34 AM Jun Rao wrote: Hi, Everyone, Just to provide an update. https://kafka.apache.org/cve-list is now upda

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Luke Chen
Hi Jun, It looks great and clear! Thank you for working on the public statement! Thank you. Luke On Wed, Dec 15, 2021 at 8:34 AM Jun Rao wrote: > Hi, Everyone, > > Just to provide an update. https://kafka.apache.org/cve-list is now > updated > with this CVE. > > Thanks, > > Jun > > On Tue, Dec

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Jun Rao
Hi, Everyone, Just to provide an update. https://kafka.apache.org/cve-list is now updated with this CVE. Thanks, Jun On Tue, Dec 14, 2021 at 3:30 PM Jun Rao wrote: > Hi, Israel, > > Randall added some clarification for the connectors in the PR. > > Thanks, > > Jun > > On Tue, Dec 14, 2021 at

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Jun Rao
Hi, Israel, Randall added some clarification for the connectors in the PR. Thanks, Jun On Tue, Dec 14, 2021 at 12:10 PM Israel Ekpo wrote: > Do we want to add a disclaimer that users need to check their connectors to > see if it uses log4j2? > > Though the core library does not use this depen

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Israel Ekpo
Do we want to add a disclaimer that users need to check their connectors to see if it uses log4j2? Though the core library does not use this dependency, it is possible external connectors that use it could introduce vulnerabilities if they depend on the affected log4j2 version On Tue, Dec 14, 20

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Israel Ekpo
Sure I will take a look at it shortly On Tue, Dec 14, 2021 at 12:44 PM Jun Rao wrote: > Hi, Luke, > > Thanks for the analysis. We are trying to put a public statement on this > through this PR: https://github.com/apache/kafka-site/pull/388. If anyone > has more feedback, we can iterate on the PR

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Jun Rao
Hi, Luke, Thanks for the analysis. We are trying to put a public statement on this through this PR: https://github.com/apache/kafka-site/pull/388. If anyone has more feedback, we can iterate on the PR. Thanks, Jun On Tue, Dec 14, 2021 at 7:53 AM Murilo Tavares wrote: > What about Kafka-Conne

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-14 Thread Murilo Tavares
What about Kafka-Connect? Anyone has checked if any of the Confluent KafkaConnect docker images embed log4j v2? Thanks On Mon, 13 Dec 2021 at 21:39, Luke Chen wrote: > Hi all, > > Here's the comments for CVE-2021-44228 vulnerability *from SLF4J project*. > REF: http://slf4j.org/log4shell.html >

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-13 Thread Luke Chen
Hi all, Here's the comments for CVE-2021-44228 vulnerability *from SLF4J project*. REF: http://slf4j.org/log4shell.html I think it's a analysis that worth reading. Most importantly, it has comments about log4j 1.x versions, which is currently Kafka used. I quote some sentences here for your refer

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-13 Thread David Ballano Fernandez
Thanks guys! On Mon, Dec 13, 2021 at 7:43 AM Brian Rickabaugh wrote: > I strongly recommend that the Kafka community publish a statement on this > vulnerability. > > This Log4J exploit is getting a lot of publicity in my organization and a > page to point our security team to would be very hel

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-13 Thread Brian Rickabaugh
I strongly recommend that the Kafka community publish a statement on this vulnerability. This Log4J exploit is getting a lot of publicity in my organization and a page to point our security team to would be very helpful. Brian Quoting Luke Chen : Due to this vulnerability is quite critical a

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-13 Thread Brian Rickabaugh
I strongly recommend that the Kafka community publish a statement on this vulnerability. This Log4J exploit is getting a lot of publicity in my organization and a page to point our security team to would be very helpful. Brian Quoting Luke Chen : Due to this vulnerability is quite critical a

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-13 Thread Luke Chen
Due to this vulnerability is quite critical and "popular" in these days, should *Kafka have an official announcement in our security cve list page or somewhere*? (i.e. https://kafka.apache.org/cve-list) So far, my assessment is that, Kafka is not using log4j 2.x versions, so the risk is lower. Kaf

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-11 Thread Luke Chen
Hi David Ballano Fernandez and all, Some update here: Based on @TopStreamsNet's comment here: https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301 log4j 1.x versions can still be vulnerable to this issue, but only when the jms configuration: *TopicBindingName* or *TopicConnecti

Re: CVE-2021-44228 – Log4j 2 Vulnerability

2021-12-11 Thread Luke Chen
Hi David Ballano Fernandez, Thanks for reporting this issue. Yes, this is the most critical 0-day vulnerability for security members. I've been investigating this CVE for a while, and I confirmed that* log4j 1.x versions are not affected by this vulnerability.* That is, *Kafka, which is using log4