Open greg-michael opened 2 years ago
@greg-michael
TL;DR - If scanner detects Log4j version, it is very unlikely to return a false positive.
META-INF/maven/org.apache.logging.log4j/log4j-core/pom.properties
exists, scanner can read exact log4j 2 version from that manifest file.org/apache/logging/log4j/core/lookup/JndiLookup.class
found, then JAR contains log4j 2 library even if pom.properties does not exist.org.apache.logging.log4j.core
to com.newrelic.agent.deps.org.apache.logging.log4j.core
. It is called 'shaded library'. To detect shaded libary, scanner tries to find zip entry which ends with /log4j/core/lookup/JndiLookup.class
.[?]
)
A vendor-provided JAR file - which has been patched by the vendor - is being scanned and is reporting vulnerable to CVE-2021-44228.
Can you provide the exact criteria that would trigger the scanner to report CVE-2021-44228 vulnerabilities in a JAR? I'd like to pass this along to the vendor so that they can confirm the false positive. Since it's a vendor-provided file, I don't know that I can provide it to you for testing without written permission from the vendor.