Correct.  I just reviewed occurrences of log.info, log.warn etc. and it's
all boring stuff that definitely doesn't take user input.

I'm going to remove this from the news in my PR:
https://github.com/apache/solr-site/pull/54

~ David Smiley
Apache Lucene/Solr Search Developer
http://www.linkedin.com/in/davidwsmiley


On Mon, Dec 13, 2021 at 7:07 PM Cassandra Targett <casstarg...@gmail.com>
wrote:

> Can someone explain why it’s no risk & can’t be exploited? Because it
> doesn’t take input?
> On Dec 12, 2021, 4:26 PM -0600, Uwe Schindler <u...@thetaphi.de>, wrote:
>
> +1
>
> I was wondering about this, too. It makes mitigation too complex. There is
> no risk in the exporter script. Just mention this as a single sentence.
>
> Possibly also add the sentence u declining the importance and why in my
> previous message on private list.
>
> Am 12. Dezember 2021 22:16:38 UTC schrieb David Smiley <dsmi...@apache.org>:
>
>>
>> Just a simple question here -- does the Prometheus Exporter present a
>> risk for the Log4j 2 vulnerability?  It was added to the news page but
>> instinctively I don't see how an attacker might exploit it.  If it's not
>> expected to be a concern, I think we should state so in the news; no reason
>> to raise undue alarm bells.  Maybe we should remove it.
>>
>> ~ David Smiley
>> Apache Lucene/Solr Search Developer
>> http://www.linkedin.com/in/davidwsmiley
>>
> --
> Uwe Schindler
> Achterdiek 19, 28357 Bremen
> https://www.thetaphi.de
>
>

Reply via email to