A search on our open meetings server (6.2.0) for apache log4j vulnerabilities:

find / -type f -print0 |xargs -n1 -0 zipgrep -i log4j2 2>/dev/null

produced these results:

com/hazelcast/logging/Logger.class:Binary file (standard input) matches
  com/hazelcast/logging/Log4j2Factory$Log4j2Logger.class:Binary file
(standard input) matches
  com/hazelcast/logging/Log4j2Factory.class:Binary file (standard
input) matches
  META-INF/maven/com.hazelcast/hazelcast/pom.xml:Â  Â  Â  Â  Â  Â
<version>${log4j2.version}</version>
  META-INF/maven/com.hazelcast/hazelcast/pom.xml:Â  Â  Â  Â  Â  Â
<version>${log4j2.version}</version>
  io/netty/util/internal/logging/Log4J2Logger$2.class:Binary file
(standard input) matches
  io/netty/util/internal/logging/Log4J2Logger.class:Binary file
(standard input) matches
  io/netty/util/internal/logging/Log4J2LoggerFactory.class:Binary file
(standard input) matches
  io/netty/util/internal/logging/Log4J2Logger$1.class:Binary file
(standard input) matches
  io/netty/util/internal/logging/InternalLoggerFactory.class:Binary
file (standard input) matches
  com/mchange/v2/log/MLog$1.class:Binary file (standard input) matches
  com/mchange/v2/log/log4j2/MLogAppender.class:Binary file (standard
input) matches
  com/mchange/v2/log/log4j2/Log4j2MLog$Log4jMLogger.class:Binary file
(standard input) matches
com/mchange/v2/log/MLogClasses.class:Binary file (standard input) matches
  com/mchange/v2/log/log4j2/Log4j2MLog.class:Binary file (standard
input) matches

META-INF/maven/slf4j-configuration.properties:org.apache.logging.slf4j.Log4jLoggerFactory
org.apache.maven.cli.logging.impl.Log4j2Configuration
  org/apache/maven/cli/logging/impl/Log4j2Configuration$1.class:Binary
file (standard input) matches
  org/apache/maven/cli/logging/impl/Log4j2Configuration.class:Binary
file (standard input) matches

This is 6.2.0 which hasn't changed in months. Can you be sure that
there isn't a  problem in 6.2.0 ?

Best,


  Ed

Le 2021-12-13 01:50, Maxim Solodovnik a écrit :
Yes,
We are not affected

To get most updated version you can use  latest SNAPSHOT :)

from mobile (sorry for typos ;)

On Mon, Dec 13, 2021, 04:21 Thomas Scholzen <tschol...@buche17.de>
wrote:

Hi Sebastian,

thank you for your assessment and quick response.

Best regards,
Thomas

Am 12.12.21 um 22:05 schrieb seba.wag...@gmail.com:

Afaik we are not using the native log4j library. I think the
vulnerability is only in the actual log4j.jar file.

log4j-over-slf4j is merely a bridge that mimics log4j APIs in order
to redirect the log stream into slf4j without rewriting the existing
log4j logging statements. The bridge ensures old dependencies that
have not been migrated to SLF4J can work with Openmeetings.

So OpenMeetings is not using or distributing the native log4j JAR
library. Also the Tomat version we are using that bundles
OpenMeetings into a Java Servlet Container is not affected since
it's not using the native log4j jar file.

So as far as I can see this vulnerability should not impact
OpenMeetings.

However OpenMeetings regularly ships updates with the latest
libraries and dependencies, so if you are not using the latest
version, you should update. There have been other CVE's fixed in
recent versions.

Thanks
Sebastian

Sebastian Wagner

Director Arrakeen Solutions, OM-Hosting.com
http://arrakeen-solutions.co.nz/

https://om-hosting.com - Cloud & Server Hosting for HTML5
Video-Conferencing OpenMeetings
[1] [2]

On Mon, 13 Dec 2021 at 07:29, Thomas Scholzen <tschol...@buche17.de>
wrote:

Openmeetings has, among others, the following dependencies:

log4j-over-slf4j-1.7.32.jar
slf4j-api-1.7.32.jar
jcl-over-slf4j-1.7.32.jar

Does anyone know, whether these are affected by the log4j
vulnerability CVE-2021-44228 and have to be updated?

Thanks,
Thomas


Links:
------
[1]
https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url
[2]
https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url

Reply via email to