> > This is 6.2.0 which hasn't changed in months. Can you be sure that > there isn't a problem in 6.2.0 ?
The logging framework OpenMeetings is using is not log4j. But we are using SLF4J. The files you highlighted are dependencies of OpenMeetings. Those "could" use log4j, they invoke log4j APIs. E.g. hazelcast can be configured to use either log4j or slf4j. However OpenMeetings is not using log4j. OpenMeetings is using SLF4j. SLF4j provides a bridge for older dependencies that rely on log4j. It also doesn't use log4j as the underlying logging framework itself. See this detailed write up of the impact of this specific vulnerability on SLF4j, especially the section about using logback: http://slf4j.org/log4shell.html Quote: *Does a similar vulnerability exist in logback?Logback does NOT offer a lookup mechanism at the message level. Thus, it is deemed safe with respect to CVE-2021-44228.* On a high level the explanation is that if you look into the actual CVE of log4j you will notice that the vulnerability is around a configuration passed into log4j: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046. So by not using log4j but logback as the underlying framework the SLF4j community is pretty save. => OpenMeetings is using logback. You can also see that if you go to $OM_HOME/webapps/openmeetings/WEB-INF/classes/logback-config.xml Which is this file: https://github.com/apache/openmeetings/blob/master/openmeetings-web/src/main/webapp/WEB-INF/classes/logback-config.xml In summary: OpenMeetings is not using log4j. SLF4j and the way how OpenMeetings is configured is also not referring to log4j but using logback. So there is little chance for anybody to use this specific vulnerability (CVE-2021-44228) to expose or execute malicious functionality on an OpenMeetings instance. Thanks, Sebastian Sebastian Wagner Director Arrakeen Solutions, OM-Hosting.com http://arrakeen-solutions.co.nz/ https://om-hosting.com - Cloud & Server Hosting for HTML5 Video-Conferencing OpenMeetings <https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url> <https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url> On Fri, 17 Dec 2021 at 08:42, <i...@bureau-de-poste.net> wrote: > A search on our open meetings server (6.2.0) for apache log4j > vulnerabilities: > > find / -type f -print0 |xargs -n1 -0 zipgrep -i log4j2 2>/dev/null > > produced these results: > > com/hazelcast/logging/Logger.class:Binary file (standard input) > matches > com/hazelcast/logging/Log4j2Factory$Log4j2Logger.class:Binary file > (standard input) matches > com/hazelcast/logging/Log4j2Factory.class:Binary file (standard > input) matches > META-INF/maven/com.hazelcast/hazelcast/pom.xml:Â Â Â Â Â Â > <version>${log4j2.version}</version> > META-INF/maven/com.hazelcast/hazelcast/pom.xml:Â Â Â Â Â Â > <version>${log4j2.version}</version> > io/netty/util/internal/logging/Log4J2Logger$2.class:Binary file > (standard input) matches > io/netty/util/internal/logging/Log4J2Logger.class:Binary file > (standard input) matches > io/netty/util/internal/logging/Log4J2LoggerFactory.class:Binary file > (standard input) matches > io/netty/util/internal/logging/Log4J2Logger$1.class:Binary file > (standard input) matches > io/netty/util/internal/logging/InternalLoggerFactory.class:Binary > file (standard input) matches > com/mchange/v2/log/MLog$1.class:Binary file (standard input) matches > com/mchange/v2/log/log4j2/MLogAppender.class:Binary file (standard > input) matches > com/mchange/v2/log/log4j2/Log4j2MLog$Log4jMLogger.class:Binary file > (standard input) matches > com/mchange/v2/log/MLogClasses.class:Binary file (standard input) > matches > com/mchange/v2/log/log4j2/Log4j2MLog.class:Binary file (standard > input) matches > > > META-INF/maven/slf4j-configuration.properties:org.apache.logging.slf4j.Log4jLoggerFactory > org.apache.maven.cli.logging.impl.Log4j2Configuration > org/apache/maven/cli/logging/impl/Log4j2Configuration$1.class:Binary > file (standard input) matches > org/apache/maven/cli/logging/impl/Log4j2Configuration.class:Binary > file (standard input) matches > > This is 6.2.0 which hasn't changed in months. Can you be sure that > there isn't a problem in 6.2.0 ? > > Best, > > > Ed > > Le 2021-12-13 01:50, Maxim Solodovnik a écrit : > > Yes, > > We are not affected > > > > To get most updated version you can use latest SNAPSHOT :) > > > > from mobile (sorry for typos ;) > > > > On Mon, Dec 13, 2021, 04:21 Thomas Scholzen <tschol...@buche17.de> > > wrote: > > > >> Hi Sebastian, > >> > >> thank you for your assessment and quick response. > >> > >> Best regards, > >> Thomas > >> > >> Am 12.12.21 um 22:05 schrieb seba.wag...@gmail.com: > >> > >> Afaik we are not using the native log4j library. I think the > >> vulnerability is only in the actual log4j.jar file. > >> > >> log4j-over-slf4j is merely a bridge that mimics log4j APIs in order > >> to redirect the log stream into slf4j without rewriting the existing > >> log4j logging statements. The bridge ensures old dependencies that > >> have not been migrated to SLF4J can work with Openmeetings. > >> > >> So OpenMeetings is not using or distributing the native log4j JAR > >> library. Also the Tomat version we are using that bundles > >> OpenMeetings into a Java Servlet Container is not affected since > >> it's not using the native log4j jar file. > >> > >> So as far as I can see this vulnerability should not impact > >> OpenMeetings. > >> > >> However OpenMeetings regularly ships updates with the latest > >> libraries and dependencies, so if you are not using the latest > >> version, you should update. There have been other CVE's fixed in > >> recent versions. > >> > >> Thanks > >> Sebastian > >> > >> Sebastian Wagner > >> > >> Director Arrakeen Solutions, OM-Hosting.com > >> http://arrakeen-solutions.co.nz/ > >> > >> https://om-hosting.com - Cloud & Server Hosting for HTML5 > >> Video-Conferencing OpenMeetings > >> [1] [2] > >> > >> On Mon, 13 Dec 2021 at 07:29, Thomas Scholzen <tschol...@buche17.de> > >> wrote: > >> > >> Openmeetings has, among others, the following dependencies: > >> > >> log4j-over-slf4j-1.7.32.jar > >> slf4j-api-1.7.32.jar > >> jcl-over-slf4j-1.7.32.jar > >> > >> Does anyone know, whether these are affected by the log4j > >> vulnerability CVE-2021-44228 and have to be updated? > >> > >> Thanks, > >> Thomas > > > > > > Links: > > ------ > > [1] > > > https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url > > [2] > > > https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url >