Open DiegoMusmarra opened 2 years ago
Hello, Widoco does not use log4j anywhere in code. It only uses slf4j (I have to figure out why the JAR is added). Widoco is also a standalone application, and as far as I know the vulnerability affects only server-based applications.
I suggest you try and remove the log4j files from the jar and give it a go. I tried that and functionality is not affected.
Oh, well, I'll try it and I'll let you know, thank you very much!
Da: Daniel Garijo @.***> Inviato: giovedì 16 dicembre 2021, 18:21 A: dgarijo/Widoco Cc: Diego Musmarra; Author Oggetto: Re: [dgarijo/Widoco] Log4J upgrade to V.2.16.0 (Issue #488)
Hello, Widoco does not use log4j anywhere in code. It only uses slf4j (I have to figure out why the JAR is added). Widoco is also a standalone application, and as far as I know the vulnerability affects only server-based applications.
I suggest you try and remove the log4j files from the jar and give it a go. I tried that and functionality is not affected.
— Reply to this email directly, view it on GitHubhttps://github.com/dgarijo/Widoco/issues/488#issuecomment-996022204, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AVNNOI7KROTPLPBUZD7JXE3URIN3BANCNFSM5KG254DQ. Triage notifications on the go with GitHub Mobile for iOShttps://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Androidhttps://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub. You are receiving this because you authored the thread.Message ID: @.***>
@dgarijo the issue is not only relevant for server-based applications. Server-based applications are more easier to attack. However, even in standalone applications it is possible to do an attack. Imagine one is passing an ontology to WiDoCo which contains malicious statements which causes a log statement to be logged by log4j. In this case potentially code can be loaded from a remote server.
So the difference is that the initial starting point of an attack is different. But still it is a relevant issue.
It would be great if either WiDoCo is removing log4j at all (if not required) or to patch to latest version of log4j (at least 2.16).
@weissjoh, that's the thing, there are no logging messages in Widoco using log4j because I replaced it with slf4j long time ago. Suggestions are welcome to make the log4j components removed from the main JAR, although I think there is no impact.
Hi, a few days ago has been noticed a vulnerability in Log4J for versions from 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 as you can see here: https://logging.apache.org/log4j/2.x/security.html In this update page we can notice that "only the log4j-core JAR file is impacted by this vulnerability. Applications using only the log4j-api JAR file without the log4j-core JAR file are not impacted by this vulnerability.", so can you please verify if the Log4J files used by Widoco are affected by this vulnerability and eventually update them to latest version?
Thank you.