This is also true in regards to the new and updated CVE-2021-45105 discovered from log4j over the last few days.
See CVE-2021-45105: https://logging.apache.org/log4j/2.x/security.html => OpenMeetings is using logback as the underlying logging framework. CVE-2021-45105 does not affect OpenMeetings. Thanks Sebastian Sebastian Wagner Director Arrakeen Solutions, OM-Hosting.com http://arrakeen-solutions.co.nz/ https://om-hosting.com - Cloud & Server Hosting for HTML5 Video-Conferencing OpenMeetings <https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url> <https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url> On Fri, 17 Dec 2021 at 14:49, Maxim Solodovnik <solomax...@gmail.com> wrote: > OM is not affected :) > > You still can add "-Dlog4j2.formatMsgNoLookups=true" just-in-case :) > > from mobile (sorry for typos ;) > > > On Fri, Dec 17, 2021, 05:50 seba.wag...@gmail.com <seba.wag...@gmail.com> > wrote: > >> This is 6.2.0 which hasn't changed in months. Can you be sure that >>> there isn't a problem in 6.2.0 ? >> >> The logging framework OpenMeetings is using is not log4j. But we are >> using SLF4J. >> >> The files you highlighted are dependencies of OpenMeetings. Those "could" >> use log4j, they invoke log4j APIs. E.g. hazelcast can be configured to use >> either log4j or slf4j. However OpenMeetings is not using log4j. >> >> OpenMeetings is using SLF4j. SLF4j provides a bridge for older >> dependencies that rely on log4j. It also doesn't use log4j as the >> underlying logging framework itself. >> >> See this detailed write up of the impact of this specific vulnerability >> on SLF4j, especially the section about using logback: >> http://slf4j.org/log4shell.html >> >> Quote: >> >> *Does a similar vulnerability exist in logback?Logback does NOT offer a >> lookup mechanism at the message level. Thus, it is deemed safe with respect >> to CVE-2021-44228.* >> >> On a high level the explanation is that if you look into the actual CVE >> of log4j you will notice that the vulnerability is around a configuration >> passed into log4j: >> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046. So by not >> using log4j but logback as the underlying framework the SLF4j community is >> pretty save. >> >> => OpenMeetings is using logback. You can also see that if you go to >> $OM_HOME/webapps/openmeetings/WEB-INF/classes/logback-config.xml >> Which is this file: >> https://github.com/apache/openmeetings/blob/master/openmeetings-web/src/main/webapp/WEB-INF/classes/logback-config.xml >> >> In summary: OpenMeetings is not using log4j. SLF4j and the way how >> OpenMeetings is configured is also not referring to log4j but using >> logback. >> >> So there is little chance for anybody to use this specific vulnerability >> (CVE-2021-44228) to expose or execute malicious functionality on an >> OpenMeetings instance. >> >> Thanks, >> Sebastian >> >> Sebastian Wagner >> Director Arrakeen Solutions, OM-Hosting.com >> http://arrakeen-solutions.co.nz/ >> https://om-hosting.com - Cloud & Server Hosting for HTML5 >> Video-Conferencing OpenMeetings >> >> <https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url> >> <https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url> >> >> >> On Fri, 17 Dec 2021 at 08:42, <i...@bureau-de-poste.net> wrote: >> >>> A search on our open meetings server (6.2.0) for apache log4j >>> vulnerabilities: >>> >>> find / -type f -print0 |xargs -n1 -0 zipgrep -i log4j2 2>/dev/null >>> >>> produced these results: >>> >>> com/hazelcast/logging/Logger.class:Binary file (standard input) >>> matches >>> com/hazelcast/logging/Log4j2Factory$Log4j2Logger.class:Binary file >>> (standard input) matches >>> com/hazelcast/logging/Log4j2Factory.class:Binary file (standard >>> input) matches >>> META-INF/maven/com.hazelcast/hazelcast/pom.xml:Â Â Â Â Â Â >>> <version>${log4j2.version}</version> >>> META-INF/maven/com.hazelcast/hazelcast/pom.xml:Â Â Â Â Â Â >>> <version>${log4j2.version}</version> >>> io/netty/util/internal/logging/Log4J2Logger$2.class:Binary file >>> (standard input) matches >>> io/netty/util/internal/logging/Log4J2Logger.class:Binary file >>> (standard input) matches >>> io/netty/util/internal/logging/Log4J2LoggerFactory.class:Binary file >>> (standard input) matches >>> io/netty/util/internal/logging/Log4J2Logger$1.class:Binary file >>> (standard input) matches >>> io/netty/util/internal/logging/InternalLoggerFactory.class:Binary >>> file (standard input) matches >>> com/mchange/v2/log/MLog$1.class:Binary file (standard input) matches >>> com/mchange/v2/log/log4j2/MLogAppender.class:Binary file (standard >>> input) matches >>> com/mchange/v2/log/log4j2/Log4j2MLog$Log4jMLogger.class:Binary file >>> (standard input) matches >>> com/mchange/v2/log/MLogClasses.class:Binary file (standard input) >>> matches >>> com/mchange/v2/log/log4j2/Log4j2MLog.class:Binary file (standard >>> input) matches >>> >>> >>> META-INF/maven/slf4j-configuration.properties:org.apache.logging.slf4j.Log4jLoggerFactory >>> org.apache.maven.cli.logging.impl.Log4j2Configuration >>> org/apache/maven/cli/logging/impl/Log4j2Configuration$1.class:Binary >>> file (standard input) matches >>> org/apache/maven/cli/logging/impl/Log4j2Configuration.class:Binary >>> file (standard input) matches >>> >>> This is 6.2.0 which hasn't changed in months. Can you be sure that >>> there isn't a problem in 6.2.0 ? >>> >>> Best, >>> >>> >>> Ed >>> >>> Le 2021-12-13 01:50, Maxim Solodovnik a écrit : >>> > Yes, >>> > We are not affected >>> > >>> > To get most updated version you can use latest SNAPSHOT :) >>> > >>> > from mobile (sorry for typos ;) >>> > >>> > On Mon, Dec 13, 2021, 04:21 Thomas Scholzen <tschol...@buche17.de> >>> > wrote: >>> > >>> >> Hi Sebastian, >>> >> >>> >> thank you for your assessment and quick response. >>> >> >>> >> Best regards, >>> >> Thomas >>> >> >>> >> Am 12.12.21 um 22:05 schrieb seba.wag...@gmail.com: >>> >> >>> >> Afaik we are not using the native log4j library. I think the >>> >> vulnerability is only in the actual log4j.jar file. >>> >> >>> >> log4j-over-slf4j is merely a bridge that mimics log4j APIs in order >>> >> to redirect the log stream into slf4j without rewriting the existing >>> >> log4j logging statements. The bridge ensures old dependencies that >>> >> have not been migrated to SLF4J can work with Openmeetings. >>> >> >>> >> So OpenMeetings is not using or distributing the native log4j JAR >>> >> library. Also the Tomat version we are using that bundles >>> >> OpenMeetings into a Java Servlet Container is not affected since >>> >> it's not using the native log4j jar file. >>> >> >>> >> So as far as I can see this vulnerability should not impact >>> >> OpenMeetings. >>> >> >>> >> However OpenMeetings regularly ships updates with the latest >>> >> libraries and dependencies, so if you are not using the latest >>> >> version, you should update. There have been other CVE's fixed in >>> >> recent versions. >>> >> >>> >> Thanks >>> >> Sebastian >>> >> >>> >> Sebastian Wagner >>> >> >>> >> Director Arrakeen Solutions, OM-Hosting.com >>> >> http://arrakeen-solutions.co.nz/ >>> >> >>> >> https://om-hosting.com - Cloud & Server Hosting for HTML5 >>> >> Video-Conferencing OpenMeetings >>> >> [1] [2] >>> >> >>> >> On Mon, 13 Dec 2021 at 07:29, Thomas Scholzen <tschol...@buche17.de> >>> >> wrote: >>> >> >>> >> Openmeetings has, among others, the following dependencies: >>> >> >>> >> log4j-over-slf4j-1.7.32.jar >>> >> slf4j-api-1.7.32.jar >>> >> jcl-over-slf4j-1.7.32.jar >>> >> >>> >> Does anyone know, whether these are affected by the log4j >>> >> vulnerability CVE-2021-44228 and have to be updated? >>> >> >>> >> Thanks, >>> >> Thomas >>> > >>> > >>> > Links: >>> > ------ >>> > [1] >>> > >>> https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url >>> > [2] >>> > >>> https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url >>> >>