Open ynedelec opened 2 years ago
I have the same question.
I am dealing with this problem too, this page might be helpful: http://slf4j.org/log4shell.html
Cromwell may be vulnerable in certain configurations. This is being looked into.
We recommend the immediate remedy of disabling the vulerable feature of Log4j:
‐Dlog4j2.formatMsgNoLookups=True
Cromwell itself does not use Log4j.
This can be verified by executing sbt dependencyTree
and noting that all instances of "log4j" occur in org.slf4j:log4j-over-slf4j
which is a Log4j compatibility bridge from a different project.
The utility tool CromwellRefdiskManifestCreator
is written in Java and does use Log4j. It is not included in the Cromwell JAR. It is being updated presently.
We redundantly re-verified the absence of the problem class [0] by unzipping the shipping Cromwell JAR and manually checking that the path is empty.
[0] org/apache/logging/log4j/core/lookup/JndiLookup.class
A simple grep through the source code reveals several hits with Log4j:
I wasn't able to expose a vulnerability by using malicious code but my test is probably not extensive. It looks like this lib is used in a packaging tool of Cromwell so probably not executed during production. On the other hand, slj4j seems to be used everywere. Is that abstraction layer vulnerable ?
Could you please let us know if you believe Cromwell is affected by Log4shell ?
Thanks,